{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T19:10:39Z","timestamp":1691867439127},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s00145-015-9210-8","type":"journal-article","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T17:59:12Z","timestamp":1438365552000},"page":"806-832","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The $$\\mathbb {Q}$$ Q -curve Construction for Endomorphism-Accelerated Elliptic Curves"],"prefix":"10.1007","volume":"29","author":[{"given":"Benjamin","family":"Smith","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"key":"9210_CR1","doi-asserted-by":"crossref","unstructured":"L. Babai, On Lovasz\u2019 lattice reduction and the nearest lattice point problem. Combinatorica\u00a06, 1\u201313 (1986)","DOI":"10.1007\/BF02579403"},{"key":"9210_CR2","doi-asserted-by":"crossref","unstructured":"D.J. Bernstein, Curve25519: newDiffie-Hellman speed records, in PKC2006, LNCS, vol. 3958 (Springer, Berlin, 2006), pp. 207\u2013228","DOI":"10.1007\/11745853_14"},{"key":"9210_CR3","doi-asserted-by":"crossref","unstructured":"D.J. Bernstein, P. Birkner, M. Joye, T. Lange, C. Peters, Twisted Edwards curves, in AFRICACRYPT 2008, LNCS, vol. 5023 (Springer, Berlin, 2008), pp. 389\u2013405","DOI":"10.1007\/978-3-540-68164-9_26"},{"key":"9210_CR4","doi-asserted-by":"crossref","unstructured":"J.W. Bos, C. Costello, H. Hisil, K. Lauter, Fast cryptography in genus 2, in EUROCRYPT 2013, LNCS, vol. 7881 (Springer, Berlin, 2013), pp. 194\u2013210","DOI":"10.1007\/978-3-642-38348-9_12"},{"key":"9210_CR5","doi-asserted-by":"crossref","unstructured":"C. Boyd, P. Montague, K. Nguyen, Elliptic curve based passworth authenticated key exchange protocols, in ACISP 2001, LNCS, vol. 2119 (Springer, Berlin, 2001), pp. 487\u2013501","DOI":"10.1007\/3-540-47719-5_38"},{"key":"9210_CR6","unstructured":"W. Bosma, J.J. Cannon, C. Fieker, A. Steel, (eds.), Handbook of Magma functions. Edition 2.19 (2013)"},{"key":"9210_CR7","doi-asserted-by":"crossref","unstructured":"O. Chevassut, P.-A. Fouque, P. Gaudry, D. Pointcheval, The twist-augmented technique for key exchange, in PKC 2006, LNCS, vol. 3958 (Springer, Berlin, 2006), pp. 410\u2013426","DOI":"10.1007\/11745853_27"},{"key":"9210_CR8","doi-asserted-by":"crossref","unstructured":"H. Cohen, G. Frey (eds.), Handbook of Elliptic and Hyperelliptic Curve Cryptography (Chapman & Hall\/CRC, 2006)","DOI":"10.1201\/9781420034981"},{"key":"9210_CR9","doi-asserted-by":"crossref","unstructured":"C. Costello, H. Hisil, B. Smith, Faster compact Diffie\u2013Hellman: endomorphisms on the x-line, in EUROCRYPT 2014, LNCS, vol. 8441 (Springer, Berlin, 2014), pp. 183\u2013200","DOI":"10.1007\/978-3-642-55220-5_11"},{"key":"9210_CR10","doi-asserted-by":"crossref","unstructured":"C. Doche, T. Icart, D.R. Kohel, Efficient scalar multiplication by isogeny decompositions, in PKC 2006, LNCS, vol. 3958 (Springer, Berlin, 2006), pp. 191\u2013206","DOI":"10.1007\/11745853_13"},{"key":"9210_CR11","doi-asserted-by":"crossref","unstructured":"N.D. Elkies, On elliptic k-curves. in Modular Curves and Abelian Varieties, eds. by J. Cremona, J.-C. Lario, J. Quer, K. Ribet (Birkh\u00e4user, Basel, 2004), pp. 81\u201392","DOI":"10.1007\/978-3-0348-7919-4_6"},{"key":"9210_CR12","doi-asserted-by":"crossref","unstructured":"J.S. Ellenberg, in $$\\mathbb{Q}$$ Q -curves and Galois representations. in Modular Curves and Abelian Varieties, eds. by J. Cremona, J.-C. Lario, J. Quer, K. Ribet, (Birkh\u00e4user, Basel, 2004), pp. 93\u2013103","DOI":"10.1007\/978-3-0348-7919-4_7"},{"key":"9210_CR13","doi-asserted-by":"crossref","unstructured":"P.-A. Fouque, R. Lercier, D. R\u00e9al, F. Valette, Fault attack on elliptic curve with Montgomery ladder, in FTDC \u201908 (IEEE-CS, 2008), pp. 92\u201398","DOI":"10.1109\/FDTC.2008.15"},{"key":"9210_CR14","doi-asserted-by":"crossref","unstructured":"G. Frey, M. M\u00fcller, H.-G. R\u00fcck, The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans. Inform. Theory\u00a045(5), 1717\u20131719, (1999)","DOI":"10.1109\/18.771254"},{"key":"9210_CR15","doi-asserted-by":"crossref","unstructured":"S.D. Galbraith, Mathematics of public key cryptography. (Cambridge University Press, 2012)","DOI":"10.1017\/CBO9781139012843"},{"key":"9210_CR16","doi-asserted-by":"crossref","unstructured":"S.D. Galbraith, X. Lin, M. Scott, Endomorphisms for faster elliptic curve cryptography on a large class of curves. J. Crypt.\u00a024(3), 446\u2013469 (2011)","DOI":"10.1007\/s00145-010-9065-y"},{"key":"9210_CR17","doi-asserted-by":"crossref","unstructured":"R.P. Gallant, R.J. Lambert, S.A. Vanstone, Faster point multiplication on elliptic curves with efficient endomorphisms, in CRYPTO 2001, LNCS, vol. 2139 (Springer, Berlin, 2001), pp. 190\u2013200","DOI":"10.1007\/3-540-44647-8_11"},{"key":"9210_CR18","doi-asserted-by":"crossref","unstructured":"J. Gonz\u00e1lez, Isogenies of polyquadratic $${\\mathbb{Q}}$$ Q -curves to their Galois conjugates. Arch. Math.\u00a077, 383\u2013390 (2001)","DOI":"10.1007\/PL00000508"},{"key":"9210_CR19","doi-asserted-by":"crossref","unstructured":"A. Guillevic, S. Ionica, Four-dimensional GLV via the Weil restriction, in ASIACRYPT 2013, LNCS, vol. 8269 (Springer, Berlin, 2013), pp. 79\u201396","DOI":"10.1007\/978-3-642-42033-7_5"},{"key":"9210_CR20","doi-asserted-by":"crossref","unstructured":"Y. Hasegawa, $$\\mathbb{Q}$$ Q -curves over quadratic fields. Manuscripta Math. 94(1), 347\u2013364 (1997)","DOI":"10.1007\/BF02677859"},{"key":"9210_CR21","doi-asserted-by":"crossref","unstructured":"H. Hisil, K. Wong, G. Carter, E. Dawson, Twisted Edwards curves revisited, in ASIACRYPT 2008, LNCS, vol. 5350 (Springer, Berlin, 2008), pp. 326\u2013343","DOI":"10.1007\/978-3-540-89255-7_20"},{"key":"9210_CR22","doi-asserted-by":"crossref","unstructured":"M. Kaib, The Gauss lattice basis reduction succeeds with any norm, in FCT\u201991, LNCS, vol. 529 (Springer, Berlin, 1991), pp. 275\u2013286","DOI":"10.1007\/3-540-54458-5_72"},{"key":"9210_CR23","doi-asserted-by":"crossref","unstructured":"B.S. Kaliski, Jr., A pseudo-random bit generator based on elliptic logarithms, in CRYPTO 1986, LNCS, vol. 263 (Springer, Berlin, 1987), pp. 84\u2013103","DOI":"10.1007\/3-540-47721-7_7"},{"key":"9210_CR24","doi-asserted-by":"crossref","unstructured":"B.S. Kaliski Jr, One-way permutations on elliptic curves. J. Cryptology\u00a03, 187\u2013199 (1991)","DOI":"10.1007\/BF00196911"},{"key":"9210_CR25","unstructured":"D.R. Kohel, Echidna databases for elliptic curves and higher dimensional analogues. http:\/\/echidna.maths.usyd.edu.au\/kohel\/dbs\/"},{"key":"9210_CR26","unstructured":"D.R. Kohel, Endomorphism rings of elliptic curves over finite fields. Ph. D. thesis (University of California at Berkeley 1996)"},{"key":"9210_CR27","doi-asserted-by":"crossref","unstructured":"D.R. Kohel, B. Smith, Efficiently computable endomorphisms for hyperelliptic curves, in ANTS-VII, LNCS, vol. 4076 (Springer, Berlin, 2006), pp. 495\u2013509","DOI":"10.1007\/11792086_35"},{"key":"9210_CR28","unstructured":"T. Lange, Efficient arithmetic on hyperelliptic curves. Ph. D. thesis (Universit\u00e4t-Gesamthochschule Essen 2001)"},{"key":"9210_CR29","doi-asserted-by":"crossref","unstructured":"P. Longa, F. Sica, Four-dimensional Gallant-Lambert-Vanstone scalar multiplication, in ASIACRYPT 2012, LNCS, vol. 7658 (Springer, Berlin, 2012), pp. 718\u2013739. Full version: http:\/\/eprint.iacr.org\/2011\/608","DOI":"10.1007\/978-3-642-34961-4_43"},{"key":"9210_CR30","doi-asserted-by":"crossref","unstructured":"B. M\u00f6ller, A public-key encryption scheme with pseudo-random ciphertexts, in ESORICS 2004, LNCS, vol. 3193 (Springer, Berlin, 2004), pp. 335\u2013351","DOI":"10.1007\/978-3-540-30108-0_21"},{"key":"9210_CR31","doi-asserted-by":"crossref","unstructured":"P.L. Montgomery, Speeding the Pollard and Elliptic Curve Methods of factorization. Math. Comp.\u00a048(177), 243\u2013264 (1987)","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"9210_CR32","doi-asserted-by":"crossref","unstructured":"A. Menezes, T. Okamoto, S.A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory\u00a039(5), 1639\u20131646 (1993)","DOI":"10.1109\/18.259647"},{"key":"9210_CR33","doi-asserted-by":"crossref","unstructured":"K. Okeya, H. Kurumatani, K. Sakurai, Elliptic curves with the Montgomery-form and their cryptographic applications. in PKC 2000, LNCS, vol. 1751 (Springer, Berlin, 2000), pp. 238\u2013257","DOI":"10.1007\/978-3-540-46588-1_17"},{"key":"9210_CR34","doi-asserted-by":"crossref","unstructured":"G.C. Pohlig, M.E. Hellman, An improved algorithm for computing logarithms over $$GF(p)$$ G F ( p ) and its cryptographic significance. IEEE Trans. Info. Theory\u00a024, 106\u2013110 (1978)","DOI":"10.1109\/TIT.1978.1055817"},{"key":"9210_CR35","doi-asserted-by":"crossref","unstructured":"J. Quer, Fields of definition of $${\\mathbb{Q}}$$ Q -curves. J. Th\u00e9or. Nombres Bordeaux\u00a013(1), 275\u2013285 (2001)","DOI":"10.5802\/jtnb.321"},{"key":"9210_CR36","doi-asserted-by":"crossref","unstructured":"J. Quer, $$\\mathbb{Q}$$ Q -curves and abelian varieties of $${\\rm GL}_2$$ GL 2 -type Proc. London Math. Soc.\u00a081(2), 285\u2013317 (2000)","DOI":"10.1112\/S0024611500012570"},{"key":"9210_CR37","doi-asserted-by":"crossref","unstructured":"R. Schoof, Elliptic curves over finite fields and the computation of square roots mod $$p$$ p . Math. Comp.\u00a044, 735\u2013763 (1985)","DOI":"10.2307\/2007968"},{"key":"9210_CR38","unstructured":"V. Shoup et al., Number Theory Library. http:\/\/www.shoup.net\/ntl\/"},{"key":"9210_CR39","doi-asserted-by":"crossref","unstructured":"I.E. Shparlinski, D. Sutantyo, Distribution of elliptic twin primes in isogeny and isomorphism classes. J. Number Theory\u00a0137, 1\u201315 (2014)","DOI":"10.1016\/j.jnt.2013.10.018"},{"key":"9210_CR40","doi-asserted-by":"crossref","unstructured":"F. Sica, M. Ciet, J.J. Quisquater, Analysis of the Gallant-Lambert-Vanstone method based on efficient endomorphisms: elliptic and hyperelliptic curves, in SAC 2002, LNCS, vol. 2595 (Springer, Berlin, 2003), pp. 21\u201336","DOI":"10.1007\/3-540-36492-7_3"},{"key":"9210_CR41","doi-asserted-by":"crossref","unstructured":"N. Smart, Elliptic curve cryptosystems over small fields of odd characteristic. J. Crypt.\u00a012, 141\u2013151 (1999)","DOI":"10.1007\/PL00003820"},{"key":"9210_CR42","doi-asserted-by":"crossref","unstructured":"B. Smith, Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians, in Algorithmic arithmetic, geometry, and coding theory, contemporary mathematics, vol. 637 (Amer. Math. Soc., Providence, RI, 2015), pp. 127\u2013141.","DOI":"10.1090\/conm\/637\/12753"},{"key":"9210_CR43","doi-asserted-by":"crossref","unstructured":"B. Smith, Families of fast elliptic curves from $${\\mathbb{Q}}$$ Q -curves, in ASIACRYPT 2013, LNCS, vol. 8269 (Springer, Berlin, 2013), pp. 61\u201378","DOI":"10.1007\/978-3-642-42033-7_4"},{"key":"9210_CR44","unstructured":"W.A. Stein et al., Sage mathematics software (The Sage development team, 2015). http:\/\/www.sagemath.org"},{"key":"9210_CR45","unstructured":"H.M. Stark, Class numbers of complex quadratic fields, in Modular functions of one variable I. Lecture Notes in Math. vol. 320, (1973), pp. 153\u2013174"},{"key":"9210_CR46","doi-asserted-by":"crossref","unstructured":"E.G. Straus, Addition chains of vectors. Amer. Math. Monthly\u00a071(7), 806\u2013808 (1964)","DOI":"10.2307\/2310930"},{"key":"9210_CR47","doi-asserted-by":"crossref","unstructured":"K. Takashima, A new type of fast endomorphisms on Jacobians of hyperelliptic curves and their cryptographic application. IEICE Trans. Fundamentals\u00a0E89-A(1), 124\u2013133 (2006)","DOI":"10.1093\/ietfec\/e89-a.1.124"},{"key":"9210_CR48","unstructured":"The Magma computational algebra system. http:\/\/magma.maths.usyd.edu.au"},{"key":"9210_CR49","unstructured":"J. V\u00e9lu, Isog\u00e9nies entre courbes elliptiques. C. R. Math. Acad. Sci. Paris\u00a0273, 238\u2013241 (1971)"},{"key":"9210_CR50","doi-asserted-by":"crossref","unstructured":"Z. Zhou, Z. Hu, M. Xu, W. Song, Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves. Inf. Proc. Lett.\u00a0110(22), 1003\u20131006 (2010)","DOI":"10.1016\/j.ipl.2010.08.014"},{"key":"9210_CR51","doi-asserted-by":"crossref","unstructured":"H.J. Zhu, Group structures of elementary supersingular abelian varieties over finite fields. J. Number Theory\u00a081, 292\u2013309 (2000)","DOI":"10.1006\/jnth.1999.2463"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9210-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-015-9210-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9210-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9210-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T18:49:02Z","timestamp":1691866142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-015-9210-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,1]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["9210"],"URL":"https:\/\/doi.org\/10.1007\/s00145-015-9210-8","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,1]]},"assertion":[{"value":"18 March 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2015","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}