{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:55Z","timestamp":1772283475127,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T00:00:00Z","timestamp":1221782400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1007\/s00145-008-9022-1","type":"journal-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T16:04:52Z","timestamp":1221753892000},"page":"330-364","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Using Abelian Varieties to Improve Pairing-Based Cryptography"],"prefix":"10.1007","volume":"22","author":[{"given":"K.","family":"Rubin","sequence":"first","affiliation":[]},{"given":"A.","family":"Silverberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,9,19]]},"reference":[{"key":"9022_CR1","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s001459900040","volume":"11","author":"R. Balasubramanian","year":"1998","unstructured":"R. Balasubramanian, N. Koblitz, The improbability that an elliptic curve has subexponential discrete log problem under the Menezes\u2013Okamoto\u2013Vanstone algorithm. J. Cryptol. 11, 141\u2013145 (1998)","journal-title":"J. Cryptol."},{"key":"9022_CR2","unstructured":"P.S.L.M. Barreto, Pairing-based crypto lounge, \n                    http:\/\/planeta.terra.com.br\/informatica\/paulobarreto\/pblounge.html"},{"key":"9022_CR3","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10623-006-9033-6","volume":"42","author":"P.S.L.M. Barreto","year":"2007","unstructured":"P.S.L.M. Barreto, S.D. Galbraith, C.\u00d3. h\u00c9igeartaigh, M. Scott, Efficient pairing computation on supersingular Abelian varieties. Des. Codes Cryptogr. 42, 239\u2013271 (2007)","journal-title":"Des. Codes Cryptogr."},{"key":"9022_CR4","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology\u2014Crypto 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, M. Franklin, Identity based encryption from the Weil pairing, in Advances in Cryptology\u2014Crypto 2001. Lect. Notes in Comp. Sci., vol.\u00a02139 (Springer, Berlin, 2001), pp.\u00a0213\u2013229. Journal version in SIAM J. Comput. 32 (2003), 586\u2013615"},{"key":"9022_CR5","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography, Proceedings of the 4th Theory of Cryptography Conference, TCC 2007","author":"D. Boneh","year":"2007","unstructured":"D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in Theory of Cryptography, Proceedings of the 4th Theory of Cryptography Conference, TCC 2007. Lect. Notes in Comp. Sci., vol.\u00a04392 (Springer, Berlin, 2007), pp.\u00a0535\u2013554"},{"key":"9022_CR6","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology\u2014Asiacrypt 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in Advances in Cryptology\u2014Asiacrypt 2001. Lect. Notes in Comp. Sci., vol.\u00a02248 (Springer, Berlin, 2001), pp.\u00a0514\u2013532"},{"key":"9022_CR7","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing. J. Cryptol. 17, 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"key":"9022_CR8","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","volume-title":"Proceedings of TCC 2005","author":"D. Boneh","year":"2005","unstructured":"D. Boneh, E.-J. Goh, K. Nissim, Evaluating 2-DNF formulas on ciphertexts, in Proceedings of TCC 2005. Lect. Notes in Comp. Sci., vol.\u00a03378 (Springer, Berlin, 2005), pp.\u00a0325\u2013341"},{"key":"9022_CR9","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/11761679_34","volume-title":"Advances in Cryptology\u2014Eurocrypt 2006","author":"D. Boneh","year":"2006","unstructured":"D. Boneh, A. Sahai, B. Waters, Fully collusion resistant traitor tracing with short ciphertexts and private keys, in Advances in Cryptology\u2014Eurocrypt 2006. Lect. Notes in Comp. Sci., vol.\u00a02442 (Springer, Berlin, 2006), pp.\u00a0573\u2013592"},{"key":"9022_CR10","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/11761679_26","volume-title":"Advances in Cryptology\u2014Eurocrypt 2006","author":"X. Boyen","year":"2006","unstructured":"X. Boyen, B. Waters, Compact group signatures without random oracles, in Advances in Cryptology\u2014Eurocrypt 2006. Lect. Notes in Comp. Sci., vol.\u00a02442 (Springer, Berlin, 2006), pp.\u00a0427\u2013444"},{"key":"9022_CR11","first-page":"41","volume":"385","author":"R. Coleman","year":"1988","unstructured":"R. Coleman, W. McCallum, Stable reduction of Fermat curves and Jacobi sum Hecke characters. J.\u00a0Reine Angew. Math. 385, 41\u2013101 (1988)","journal-title":"J.\u00a0Reine Angew. Math."},{"key":"9022_CR12","unstructured":"C. Diem, A study on theoretical and practical aspects of Weil-restrictions of varieties. Dissertation, 2001, \n                    http:\/\/www.math.uni-leipzig.de\/~diem\/dissertation_diem.dvi"},{"key":"9022_CR13","first-page":"153","volume":"18","author":"C. Diem","year":"2003","unstructured":"C. Diem, N. Naumann, On the structure of Weil restrictions of Abelian varieties. J. Ramanujan Math. Soc. 18, 153\u2013174 (2003)","journal-title":"J. Ramanujan Math. Soc."},{"key":"9022_CR14","unstructured":"C. Diem, J. Scholten, An attack on a trace-zero cryptosystem, preprint"},{"key":"9022_CR15","first-page":"45","volume-title":"Arithmetic, Geometry and Coding Theory","author":"I. Duursma","year":"1996","unstructured":"I. Duursma, Class numbers for some hyperelliptic curves, in Arithmetic, Geometry and Coding Theory, Luminy, 1993 (de Gruyter, Berlin, 1996), pp.\u00a045\u201352"},{"key":"9022_CR16","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-642-57189-3_6","volume-title":"Coding Theory, Cryptography and Related Areas","author":"I. Duursma","year":"2000","unstructured":"I. Duursma, K. Sakurai, Efficient algorithms for the Jacobian variety of hyperelliptic curves y\n                           2=x\n                           \n                    p\n                  \u2212x+1 over a finite field of odd characteristic p, in Coding Theory, Cryptography and Related Areas, Guanajuato, 1998 (Springer, Berlin, 2000), pp.\u00a073\u201389"},{"key":"9022_CR17","unstructured":"G. Frey, How to disguise an elliptic curve (Weil descent), Lecture at ECC \u201998, \n                    http:\/\/www.cacr.math.uwaterloo.ca\/conferences\/1998\/ecc98\/frey.ps"},{"key":"9022_CR18","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/978-3-642-56755-1_13","volume-title":"Finite Fields and Applications","author":"G. Frey","year":"2001","unstructured":"G. Frey, Applications of arithmetical geometry to cryptographic constructions, in Finite Fields and Applications, Augsburg, 1999 (Springer, Berlin, 2001), pp.\u00a0128\u2013161."},{"key":"9022_CR19","doi-asserted-by":"publisher","first-page":"865","DOI":"10.2307\/2153546","volume":"62","author":"G. Frey","year":"1994","unstructured":"G. Frey, H.-G. R\u00fcck, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comput. 62, 865\u2013874 (1994)","journal-title":"Math. Comput."},{"key":"9022_CR20","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-45682-1_29","volume-title":"Advances in Cryptology\u2014Asiacrypt 2001","author":"S. Galbraith","year":"2001","unstructured":"S. Galbraith, Supersingular curves in cryptography, in Advances in Cryptology\u2014Asiacrypt 2001. Lect. Notes in Comp. Sci., vol.\u00a02248 (Springer, Berlin, 2001), pp.\u00a0495\u2013513"},{"key":"9022_CR21","unstructured":"P. Gaudry, Index calculus for Abelian varieties and the elliptic curve discrete logarithm problem, to appear in J. Symbolic Comput."},{"key":"9022_CR22","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00145-001-0011-x","volume":"15","author":"P. Gaudry","year":"2002","unstructured":"P. Gaudry, F. Hess, N.P. Smart, Constructive and destructive facets of Weil descent on elliptic curves. J.\u00a0Cryptol. 15, 19\u201346 (2002)","journal-title":"J.\u00a0Cryptol."},{"key":"9022_CR23","doi-asserted-by":"publisher","first-page":"734","DOI":"10.2307\/2321679","volume":"85","author":"S.W. Golomb","year":"1978","unstructured":"S.W. Golomb, Cyclotomic polynomials and factorization theorems. Am. Math. Monthly 85, 734\u2013737 (1978)","journal-title":"Am. Math. Monthly"},{"key":"9022_CR24","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/11761679_21","volume-title":"Advances in Cryptology\u2014Eurocrypt 2006","author":"J. Groth","year":"2006","unstructured":"J. Groth, R. Ostrovsky, A. Sahai, Perfect non-interactive zero knowledge for NP, in Advances in Cryptology\u2014Eurocrypt 2006. Lect. Notes in Comp. Sci., vol.\u00a02442 (Springer, Berlin, 2006), pp.\u00a0339\u2013358"},{"key":"9022_CR25","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-73489-5_16","volume-title":"Pairing-Based Cryptography\u2014Pairing 2007","author":"L. Hitt","year":"2007","unstructured":"L. Hitt, On the minimal embedding field, in Pairing-Based Cryptography\u2014Pairing 2007. Lect. Notes in Comp. Sci., vol.\u00a04575 (Springer, Berlin, 2007), pp.\u00a0294\u2013301"},{"key":"9022_CR26","doi-asserted-by":"publisher","first-page":"83","DOI":"10.2969\/jmsj\/02010083","volume":"20","author":"T. Honda","year":"1968","unstructured":"T. Honda, Isogeny classes of Abelian varieties over finite fields. J. Math. Soc. Jpn. 20, 83\u201395 (1968)","journal-title":"J. Math. Soc. Jpn."},{"key":"9022_CR27","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory (ANTS-IV)","author":"A. Joux","year":"2000","unstructured":"A. Joux, A one round protocol for tripartite Diffie\u2013Hellman, in Algorithmic Number Theory (ANTS-IV), Lect. Notes in Comp. Sci., vol.\u00a01838 (Springer, Berlin, 2000), pp.\u00a0385\u2013394"},{"key":"9022_CR28","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/11761679_16","volume-title":"Advances in Cryptology\u2014Eurocrypt 2006","author":"A. Joux","year":"2006","unstructured":"A. Joux, R. Lercier, The function field sieve in the medium prime case, in Advances in Cryptology\u2014Eurocrypt 2006. Lect. Notes in Comp. Sci., vol.\u00a04004 (Springer, Berlin, 2006), pp.\u00a0254\u2013270"},{"key":"9022_CR29","unstructured":"KASH, \n                    http:\/\/www.math.tu-berlin.de\/~kant\/kash_main.html"},{"key":"9022_CR30","first-page":"15","volume":"19","author":"T. Lange","year":"2004","unstructured":"T. Lange, Trace zero subvarieties of genus 2 curves for cryptosystems. J. Ramanujan Math. Soc. 19, 15\u201333 (2004)","journal-title":"J. Ramanujan Math. Soc."},{"key":"9022_CR31","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44598-6_1","volume-title":"Advances in Cryptology\u2014CRYPTO 2000","author":"A.K. Lenstra","year":"2000","unstructured":"A.K. Lenstra, E.R. Verheul, The XTR public key system, in Advances in Cryptology\u2014CRYPTO 2000. Lect. Notes in Comp. Sci., vol.\u00a01880 (Springer, Berlin, 2000), pp.\u00a01\u201319"},{"key":"9022_CR32","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.jalgebra.2007.02.052","volume":"314","author":"B. Mazur","year":"2007","unstructured":"B. Mazur, K. Rubin, A. Silverberg, Twisting commutative algebraic groups. J. Algebra 314, 419\u2013438 (2007)","journal-title":"J. Algebra"},{"key":"9022_CR33","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A.J. Menezes","year":"1993","unstructured":"A.J. Menezes, T. Okamoto, S.A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39, 1639\u20131646 (1993)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9022_CR34","first-page":"1234","volume":"5","author":"A. Miyaji","year":"2001","unstructured":"A. Miyaji, M. Nakabayashi, S. Takano, New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. E84-A 5, 1234\u20131243 (2001)","journal-title":"IEICE Trans. Fundam. E84-A"},{"key":"9022_CR35","first-page":"71","volume":"16","author":"W.B. M\u00fcller","year":"1981","unstructured":"W.B. M\u00fcller, W. N\u00f6bauer, Some remarks on public-key cryptosystems. Stud. Sci. Math. Hungar. 16, 71\u201376 (1981)","journal-title":"Stud. Sci. Math. Hungar."},{"key":"9022_CR36","series-title":"Tata Institute of Fundamental Research Studies in Mathematics","volume-title":"Abelian Varieties","author":"D. Mumford","year":"1970","unstructured":"D. Mumford, Abelian Varieties. Tata Institute of Fundamental Research Studies in Mathematics, vol.\u00a05 (Oxford University Press, London, 1970)"},{"key":"9022_CR37","volume-title":"Weil-Restriktion Abelscher Variet\u00e4ten","author":"N. Naumann","year":"1999","unstructured":"N. Naumann, Weil-Restriktion Abelscher Variet\u00e4ten (Diplomarbeit, Universit\u00e4t Essen, 1999), unpublished"},{"key":"9022_CR38","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45708-9_22","volume-title":"Advances in Cryptology\u2014CRYPTO 2002","author":"K. Rubin","year":"2002","unstructured":"K. Rubin, A. Silverberg, Supersingular Abelian varieties in cryptology, in Advances in Cryptology\u2014CRYPTO 2002. Lect. Notes in Comp. Sci., vol.\u00a02442 (Springer, Berlin, 2002), pp.\u00a0336\u2013353"},{"key":"9022_CR39","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/978-3-540-45146-4_21","volume-title":"Advances in Cryptology\u2014CRYPTO 2003","author":"K. Rubin","year":"2003","unstructured":"K. Rubin, A. Silverberg, Torus-based cryptography, in Advances in Cryptology\u2014CRYPTO 2003. Lect. Notes in Comp. Sci., vol.\u00a02729 (Springer, Berlin, 2003), pp.\u00a0349\u2013365"},{"key":"9022_CR40","series-title":"Lect. Notes in Comp. Sci.","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/978-3-540-24847-7_2","volume-title":"Proceedings of ANTS-VI","author":"K. Rubin","year":"2004","unstructured":"K. Rubin, A. Silverberg, Using primitive subgroups to do more with fewer bits, in Proceedings of ANTS-VI. Lect. Notes in Comp. Sci., vol.\u00a03076 (Springer, Berlin, 2004), pp.\u00a018\u201341"},{"key":"9022_CR41","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1137\/060676155","volume":"37","author":"K. Rubin","year":"2008","unstructured":"K. Rubin, A. Silverberg, Compression in finite fields and torus-based cryptography. SIAM J. Comput. 37, 1401\u20131428 (2008)","journal-title":"SIAM J. Comput."},{"key":"9022_CR42","unstructured":"R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, SCIS2000 (The 2000 Symposium on Cryptography and Information Security), Okinawa, Japan, January 26\u201328, 2000, p.\u00a0C20"},{"key":"9022_CR43","series-title":"Lecture Notes Ser. Comput.","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/9789812701640_0001","volume-title":"Computational Aspects of Algebra Curves","author":"E.F. Schaefer","year":"2005","unstructured":"E.F. Schaefer, A new proof for the non-degeneracy of the Frey-R\u00fcck pairing and a connection to isogenies over the base field, in Computational Aspects of Algebra Curves. Lecture Notes Ser. Comput., vol.\u00a013 (World Sci. Publ., Hackensack, 2005), pp.\u00a01\u201312, \n                    http:\/\/math.scu.edu\/~eschaefe\/0317.pdf"},{"key":"9022_CR44","series-title":"Publications of the Mathematical Society of Japan","volume-title":"Introduction to the Arithmetic Theory of Automorphic Functions, Reprint of the 1971 Original","author":"G. Shimura","year":"1994","unstructured":"G. Shimura, Introduction to the Arithmetic Theory of Automorphic Functions, Reprint of the 1971 Original. Publications of the Mathematical Society of Japan, vol.\u00a011 (Princeton University Press, Princeton, 1994)"},{"key":"9022_CR45","doi-asserted-by":"crossref","DOI":"10.1515\/9781400883943","volume-title":"Abelian Varieties with Complex Multiplication and Modular Functions","author":"G. Shimura","year":"1998","unstructured":"G. Shimura, Abelian Varieties with Complex Multiplication and Modular Functions (Princeton Univ. Press, Princeton, 1998)"},{"key":"9022_CR46","unstructured":"A. Silverberg, Compression for trace zero subgroups of elliptic curves, in the Proceedings of the Daewoo Workshop on Cryptography, in Trends in Mathematics, vol.\u00a08 (2005), pp.\u00a093\u2013100"},{"key":"9022_CR47","first-page":"103","volume-title":"Proceedings of the IFIP TC11 Ninth International Conference on Information Security IFIP\/Sec \u201993","author":"P.J. Smith","year":"1993","unstructured":"P.J. Smith, M.J.J. Lennon, LUC: a new public key system, in Proceedings of the IFIP TC11 Ninth International Conference on Information Security IFIP\/Sec \u201993 (North-Holland, Amsterdam, 1993), pp.\u00a0103\u2013117."},{"key":"9022_CR48","series-title":"Lect. Notes in Comp. Sci.","first-page":"357","volume-title":"Advances in Cryptology\u2014Asiacrypt 1994","author":"P. Smith","year":"1995","unstructured":"P. Smith, C. Skinner, A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms, in Advances in Cryptology\u2014Asiacrypt 1994. Lect. Notes in Comp. Sci., vol.\u00a0917 (Springer, Berlin, 1995), pp.\u00a0357\u2013364"},{"key":"9022_CR49","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/BF01404549","volume":"2","author":"J. Tate","year":"1966","unstructured":"J. Tate, Endomorphisms of Abelian varieties over finite fields. Invent. Math. 2, 134\u2013144 (1966)","journal-title":"Invent. Math."},{"key":"9022_CR50","first-page":"95","volume-title":"S\u00e9minaire Bourbaki","author":"J. Tate","year":"1968","unstructured":"J. Tate, Classes d\u2019isog\u00e9nie des vari\u00e9t\u00e9s ab\u00e9liennes sur un corps fini (d\u2019apr\u00e8s T. Honda), in S\u00e9minaire Bourbaki, 1968\/69 (Soc. Math. France, Paris, 1968), pp.\u00a095\u2013110"},{"issue":"4","key":"9022_CR51","doi-asserted-by":"crossref","first-page":"521","DOI":"10.24033\/asens.1183","volume":"2","author":"W.C. Waterhouse","year":"1969","unstructured":"W.C. Waterhouse, Abelian varieties over finite fields. Ann. Sci. \u00c9cole Norm. Sup. 2(4), 521\u2013560 (1969)","journal-title":"Ann. Sci. \u00c9cole Norm. Sup."},{"key":"9022_CR52","series-title":"Progress in Math.","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-9156-2","volume-title":"Adeles and Algebraic Groups","author":"A. Weil","year":"1982","unstructured":"A. Weil, Adeles and Algebraic Groups. Progress in Math., vol.\u00a023 (Birkh\u00e4user, Boston, 1982)"},{"key":"9022_CR53","unstructured":"A. Weimerskirch, The application of the Mordell\u2013Weil group to cryptographic systems, MS thesis, Worcester Polytechnic Institute (2001), \n                    http:\/\/weimerskirch.org\/papers\/Weimerskirch_MordellWeilMSThesis.pdf"},{"key":"9022_CR54","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1006\/jnth.1999.2463","volume":"81","author":"H.J. Zhu","year":"2000","unstructured":"H.J. Zhu, Group structures of elementary supersingular Abelian varieties over finite fields. J. Number Theory 81, 292\u2013309 (2000)","journal-title":"J. Number Theory"},{"key":"9022_CR55","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1006\/jnth.2000.2562","volume":"86","author":"H.J. Zhu","year":"2001","unstructured":"H.J. Zhu, Supersingular Abelian varieties over finite fields. J. Number Theory 86, 61\u201377 (2001)","journal-title":"J. Number Theory"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9022-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-008-9022-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9022-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9022-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:41:46Z","timestamp":1586335306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-008-9022-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,19]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,7]]}},"alternative-id":["9022"],"URL":"https:\/\/doi.org\/10.1007\/s00145-008-9022-1","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9,19]]},"assertion":[{"value":"24 December 2006","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2008","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2008","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}