{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:14:15Z","timestamp":1725794055109},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662434130"},{"type":"electronic","value":"9783662434147"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_23","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T10:57:06Z","timestamp":1400583426000},"page":"456-470","source":"Crossref","is-referenced-by-count":0,"title":["Faster Repeated Doublings on Binary Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Doche","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Sutantyo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"key":"23_CR1","series-title":"LNCS","first-page":"307","volume-title":"SAC 2005","author":"A Antipa","year":"2006","unstructured":"Antipa, A., Brown, D., Gallant, R.P., Lambert, R., Struik, R., Vanstone, S.A.: Accelerated verification of ECDSA signatures. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 307\u2013318. Springer, Heidelberg (2006)"},{"key":"23_CR2","series-title":"LNCS","first-page":"138","volume-title":"SAC 2007","author":"RM Avanzi","year":"2007","unstructured":"Avanzi, R.M.: Another look at square roots (and other less common operations) in fields of even characteristic. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 138\u2013154. Springer, Heidelberg (2007)"},{"key":"23_CR3","volume-title":"Discrete Mathematics and its Applications","author":"RM Avanzi","year":"2005","unstructured":"Avanzi, R.M., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of elliptic and hyperelliptic curve cryptography. In: Avanzi, R.M., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F. (eds.) Discrete Mathematics and its Applications. Chapman & Hall, Boca Raton (2005)"},{"key":"23_CR4","unstructured":"Bernstein, D.J., Lange, T.: Explicit-formulas database. http:\/\/www.hyperelliptic.org\/EFD\/"},{"key":"23_CR5","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"IF Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series, vol. 265. Cambridge University Press, Cambridge (1999)"},{"key":"23_CR6","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546570","volume-title":"Advances in Elliptic Curve Cryptography","author":"IF Blake","year":"2005","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series, vol. 317. Cambridge University Press, Cambridge (2005)"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10623-005-3299-y","volume":"39","author":"M Ciet","year":"2006","unstructured":"Ciet, M., Joye, M., Lauter, K., Montgomery, P.L.: Trading inversions for multiplications in elliptic curve cryptography. Des. Codes Crypt. 39(2), 189\u2013206 (2006)","journal-title":"Des. Codes Crypt."},{"key":"23_CR8","series-title":"LNCS","first-page":"51","volume-title":"ASIACRYPT 1998","author":"H Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"23_CR9","series-title":"LNCS","first-page":"245","volume-title":"ACISP 2007","author":"E Dahmen","year":"2007","unstructured":"Dahmen, E., Okeya, K., Schepers, D.: Affine precomputation with sole inversion in elliptic curve cryptography. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 245\u2013258. Springer, Heidelberg (2007)"},{"key":"23_CR10","series-title":"LNCS","first-page":"389","volume-title":"EUROCRYPT 1994","author":"P Rooij de","year":"1995","unstructured":"de Rooij, P.: Efficient exponentiation using precomputation and vector addition chains. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 389\u2013399. Springer, Heidelberg (1995)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Doche, C.: Exponentiation. In: [3], pp. 145\u2013168 (2005)","DOI":"10.1201\/9781420034981.pt2"},{"key":"23_CR12","series-title":"LNCS","first-page":"191","volume-title":"PKC 2006","author":"Ch Doche","year":"2006","unstructured":"Doche, Ch., Icart, T., Kohel, D.R.: Efficient scalar multiplication by isogeny decompositions. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 191\u2013206. Springer, Heidelberg (2006)"},{"key":"23_CR13","unstructured":"Free Software Foundation. GNU Multiple Precision Library. http:\/\/gmplib.org\/"},{"key":"23_CR14","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2003)"},{"key":"23_CR15","series-title":"LNCS","first-page":"135","volume-title":"ASIACRYPT 1999","author":"EW Knudsen","year":"1999","unstructured":"Knudsen, E.W.: Elliptic scalar multiplication using point halving. In: Lam, K.-Y., Okamoto, E., Xing, Ch. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 135\u2013149. Springer, Heidelberg (1999)"},{"key":"23_CR16","series-title":"LNCS","first-page":"316","volume-title":"CHES 1999","author":"J L\u00f3pez","year":"1999","unstructured":"L\u00f3pez, J., Dahab, R.: Fast Multiplication on Elliptic Curves over $$GF$$ (2 $$_{\\rm m}$$ ) without Precomputation. In: Ko\u00e7, C., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 316\u2013327. Springer, Heidelberg (1999)"},{"key":"23_CR17","series-title":"LNCS","first-page":"201","volume-title":"SAC 1998","author":"J L\u00f3pez","year":"1999","unstructured":"L\u00f3pez, J., Dahab, R.: Improved algorithms for elliptic curve arithmetic in $$GF$$ (2 $$_{\\rm n}$$ ). In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 201\u2013212. Springer, Heidelberg (1999)"},{"key":"23_CR18","series-title":"LNCS","first-page":"51","volume-title":"ASIACRYPT 1998","author":"H Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"23_CR19","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curves methods of factorisation. Math. Comp. 48, 243\u2013264 (1987)","journal-title":"Math. Comp."},{"key":"23_CR20","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F Morain","year":"1990","unstructured":"Morain, F., Olivos, J.: Speeding up the computations on an elliptic curve using addition-subtraction chains. Inf. Theor. Appl. 24, 531\u2013543 (1990)","journal-title":"Inf. Theor. Appl."},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/S0065-2458(08)60610-5","volume":"1","author":"G Reitwiesner","year":"1962","unstructured":"Reitwiesner, G.: Binary arithmetic. Adv. Comput. 1, 231\u2013308 (1962)","journal-title":"Adv. Comput."},{"key":"23_CR22","unstructured":"Shoup, V.: NTL: A Library for doing Number Theory. http:\/\/www.shoup.net\/ntl"},{"key":"23_CR23","unstructured":"Solinas, J.A.: Improved algorithms for arithmetic on anomalous binary curves. Technical Report CORR 99\u201346, CACR. http:\/\/cacr.uwaterloo.ca\/techreports\/1999\/corr99-46.pdf (1999)"},{"key":"23_CR24","unstructured":"Solinas, J.A.: Low-weight binary representations for pairs of integers. Combinatorics and Optimization Research Report CORR 2001\u201341, University of Waterloo (2001)"},{"key":"23_CR25","series-title":"LNCS","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"M Stam","year":"2003","unstructured":"Stam, M.: On montgomery-like representations for elliptic curves over GF $$(2^{k})$$ . In: Desmedt, Y.G. (ed.) Public Key Cryptography \u2014 PKC 2003. LNCS, vol. 2567. Springer, Heidelberg (2003)"},{"key":"23_CR26","first-page":"806","volume":"70","author":"EG Straus","year":"1964","unstructured":"Straus, E.G.: Addition chains of vectors (problem 5125). Amer. Math. Mon. 70, 806\u2013808 (1964)","journal-title":"Amer. Math. Mon."},{"key":"23_CR27","series-title":"LNCS","first-page":"99","volume-title":"ISC 2004","author":"T Takagi","year":"2004","unstructured":"Takagi, T., Yen, S.-M., Wu, B.-C.: Radix-r non-adjacent form. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 99\u2013110. Springer, Heidelberg (2004)"},{"key":"23_CR28","series-title":"Discrete Mathematics and its Applications","doi-asserted-by":"crossref","DOI":"10.4324\/9780203484029","volume-title":"Elliptic Curves: Number Theory and Cryptography","author":"LC Washington","year":"2003","unstructured":"Washington, L.C.: Elliptic Curves: Number Theory and Cryptography. Discrete Mathematics and its Applications. Chapman & Hall, Boca Raton (2003)"},{"issue":"1","key":"23_CR29","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1137\/0205008","volume":"5","author":"ACC Yao","year":"1976","unstructured":"Yao, A.C.C.: On the evaluation of powers. SIAM J. Comput. 5(1), 100\u2013103 (1976)","journal-title":"SIAM J. Comput."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T17:29:38Z","timestamp":1649006978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}