{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:35:48Z","timestamp":1768523748238,"version":"3.49.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s00145-019-09320-4","type":"journal-article","created":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T14:38:52Z","timestamp":1554475132000},"page":"92-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Kummer for Genus One Over Prime-Order Fields"],"prefix":"10.1007","volume":"33","author":[{"given":"Sabyasachi","family":"Karati","sequence":"first","affiliation":[]},{"given":"Palash","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"issue":"4","key":"9320_CR1","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1016\/0021-8693(69)90117-3","volume":"13","author":"J Barwise","year":"1969","unstructured":"J. Barwise, P. Eklof, Lefschetz\u2019s principle. Journal of Algebra. 13(4), 554\u2013570 (1969)","journal-title":"Journal of Algebra"},{"key":"9320_CR2","doi-asserted-by":"crossref","unstructured":"D. J. Bernstein, Curve25519: New Diffie-Hellman speed records. in Public Key Cryptography - PKC, volume 3958 of Lecture Notes in Computer Science, (Springer, 2006), pp. 207\u2013228","DOI":"10.1007\/11745853_14"},{"key":"9320_CR3","unstructured":"D. J. Bernstein, Elliptic vs. hyperelliptic, part I. Talk at ECC. (2006)"},{"key":"9320_CR4","doi-asserted-by":"crossref","unstructured":"D.J. Bernstein, C. Chuengsatiansup, T. Lange, P. Schwabe, Kummer strikes back: New DH speed records. in Advances in Cryptology - ASIACRYPT, volume 8873 of Lecture Notes in Computer Science, (Springer, 2014), pp. 317\u2013337","DOI":"10.1007\/978-3-662-45611-8_17"},{"key":"9320_CR5","unstructured":"D. J. Bernstein, T. Lange, Safecurves: choosing safe curves for elliptic-curve cryptography. http:\/\/safecurves.cr.yp.to\/index.html , accessed on September 1, (2018)"},{"key":"9320_CR6","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang, High-speed high-security signatures. in Bart Preneel and Tsuyoshi Takagi, editors, Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28\u2013October 1, 2011. Proceedings, volume 6917 of Lecture Notes in Computer Science, (Springer, 2011), pp. 124\u2013142","DOI":"10.1007\/978-3-642-23951-9_9"},{"key":"9320_CR7","doi-asserted-by":"crossref","unstructured":"Daniel J, Bernstein and Peter Schwabe. NEON crypto. in Emmanuel Prouff and Patrick Schaumont, editors, Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9\u201312, 2012. Proceedings, volume 7428 of Lecture Notes in Computer Science, (Springer, 2012), pp. 320\u2013339","DOI":"10.1007\/978-3-642-33027-8_19"},{"key":"9320_CR8","doi-asserted-by":"crossref","unstructured":"Guido Bertoni, Jean-S\u00e9bastien Coron, editors. Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20\u201323, 2013. Proceedings, volume 8086 of Lecture Notes in Computer Science, (Springer, 2013)","DOI":"10.1007\/978-3-642-40349-1"},{"key":"9320_CR9","doi-asserted-by":"crossref","unstructured":"Joppe W. Bos, Craig Costello, H\u00fcseyin Hisil, Kristin E. Lauter, Fast cryptography in genus 2. in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26\u201330, 2013. Proceedings, volume 7881 of Lecture Notes in Computer Science, (Springer, 2013), pp. 194\u2013210","DOI":"10.1007\/978-3-642-38348-9_12"},{"key":"9320_CR10","unstructured":"Joppe W. Bos, Craig Costello, H\u00fcseyin Hisil, Kristin\u00a0E. Lauter, High-performance scalar multiplication using 8-dimensional GLV\/GLS decomposition. in Bertoni and Coron [10], pp. 331\u2013348"},{"key":"9320_CR11","unstructured":"Brainpool, ECC standard. http:\/\/www.ecc-brainpool.org\/ecc-standard.htm"},{"key":"9320_CR12","doi-asserted-by":"crossref","unstructured":"Tung Chou, Sandy2x: New Curve25519 speed records. in Orr Dunkelman and Liam Keliher, editors, Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12\u201314, 2015, Revised Selected Papers, volume 9566 of Lecture Notes in Computer Science, (Springer, 2015), pp. 145\u2013160","DOI":"10.1007\/978-3-319-31301-6_8"},{"issue":"270","key":"9320_CR13","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1090\/S0025-5718-09-02295-9","volume":"79","author":"R Cosset","year":"2010","unstructured":"R. Cosset, Factorization with genus 2 curves. Mathematics of Computation. 79(270),1191\u20131208 (2010)","journal-title":"Mathematics of Computation"},{"key":"9320_CR14","doi-asserted-by":"crossref","unstructured":"C. Costello, P. Longa, Four( $${\\mathbb{Q}}$$ Q ): Four-dimensional decompositions on a $${\\mathbb{Q}}$$ Q -curve over the Mersenne prime. in Advances in Cryptology - ASIACRYPT Part I, volume 9452 of Lecture Notes in Computer Science, (Springer, 2015), pp. 214\u2013235","DOI":"10.1007\/978-3-662-48797-6_10"},{"key":"9320_CR15","doi-asserted-by":"crossref","unstructured":"Craig Costello, H\u00fcseyin Hisil, Benjamin Smith, Faster compact Diffie-Hellman: Endomorphisms on the x-line. in Phong\u00a0Q. Nguyen and Elisabeth Oswald, editors, Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11\u201315, 2014. Proceedings, volume 8441 of Lecture Notes in Computer Science, (Springer, 2014), pp. 183\u2013200","DOI":"10.1007\/978-3-642-55220-5_11"},{"key":"9320_CR16","doi-asserted-by":"crossref","unstructured":"Neil Costigan, Peter Schwabe, Fast elliptic-curve cryptography on the cell broadband engine. in Bart Preneel, editor, Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21\u201325, 2009. Proceedings, volume 5580 of Lecture Notes in Computer Science, (Springer, 2009), pp. 368\u2013385","DOI":"10.1007\/978-3-642-02384-2_23"},{"key":"9320_CR17","unstructured":"Curve25519. Wikipedia page on Curve25519. https:\/\/en.wikipedia.org\/wiki\/Curve25519 , accessed on September 1, (2018)"},{"key":"9320_CR18","unstructured":"M. J. Dworkin, SHA-3 standard: Permutation-based hash and extendable-output functions. Technical report, National Institute of Standards and Technology (NIST). (2015). http:\/\/www.nist.gov\/manuscript-publication-search.cfm?pub_id=919061"},{"key":"9320_CR19","doi-asserted-by":"crossref","unstructured":"Armando Faz-Hern\u00e1ndez, Patrick Longa, Ana\u00a0H. S\u00e1nchez, Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves. in Josh Benaloh, editor, Topics in Cryptology - CT-RSA 2014 - The Cryptographer\u2019s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25\u201328, 2014. Proceedings, volume 8366 of Lecture Notes in Computer Science, (Springer, 2014), pp. 1\u201327","DOI":"10.1007\/978-3-319-04852-9_1"},{"key":"9320_CR20","doi-asserted-by":"crossref","unstructured":"Armando Faz-Hern\u00e1ndez, Julio L\u00f3pez, Fast implementation of Curve25519 using AVX2. in Kristin E. Lauter and Francisco Rodr\u00edguez-Henr\u00edquez, editors, Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23\u201326, 2015, Proceedings, volume 9230 of Lecture Notes in Computer Science, (Springer, 2015), pp. 329\u2013345","DOI":"10.1007\/978-3-319-22174-8_18"},{"key":"9320_CR21","unstructured":"E.V. Flynn, Formulas for Kummer on genus 2. http:\/\/people.maths.ox.ac.uk\/flynn\/genus2\/kummer\/ , accessed on September 1, (2018)"},{"key":"9320_CR22","first-page":"45","volume":"439","author":"EV Flynn","year":"1993","unstructured":"E.V. Flynn, The group law on the Jacobian of a curve of genus 2. J. reine angew. Math.439,45\u201369(1993)","journal-title":"J. reine angew. Math."},{"key":"9320_CR23","unstructured":"Code for Kummer Line\u00a0Computations. https:\/\/github.com\/skarati\/KummerLineV02"},{"key":"9320_CR24","unstructured":"Code for qDSA on Kummer Line. https:\/\/github.com\/skarati\/qDSA"},{"issue":"3","key":"9320_CR25","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/BF01186653","volume":"55","author":"G Frey","year":"1986","unstructured":"G. Frey, H.-G. R\u00fcck, The strong Lefschetz principle in algebraic geometry. Manuscripta Mathematica. 55(3), 385\u2013401 (1986)","journal-title":"Manuscripta Mathematica"},{"issue":"3","key":"9320_CR26","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1515\/JMC.2007.012","volume":"1","author":"P Gaudry","year":"2007","unstructured":"P. Gaudry, Fast genus 2 arithmetic based on theta functions. J. Mathematical Cryptology. 1(3), 243\u2013265 (2007)","journal-title":"J. Mathematical Cryptology"},{"key":"9320_CR27","unstructured":"P. Gaudry. Personal communication. (2016)"},{"issue":"2","key":"9320_CR28","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.ffa.2008.12.006","volume":"15","author":"P Gaudry","year":"2009","unstructured":"P. Gaudry, D. Lubicz, The arithmetic of characteristic 2 Kummer surfaces and of elliptic Kummer lines. Finite Fields and Their Applications. 15(2), 246\u2013260 (2009)","journal-title":"Finite Fields and Their Applications"},{"issue":"4","key":"9320_CR29","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.jsc.2011.09.003","volume":"47","author":"P Gaudry","year":"2012","unstructured":"P. Gaudry, \u00c9. Schost, Genus 2 point counting over prime fields. J. Symb. Comput.47(4), 368\u2013400 (2012)","journal-title":"J. Symb. Comput."},{"key":"9320_CR30","doi-asserted-by":"crossref","unstructured":"S. Gueron, Software optimizations for cryptographic primitives on general purpose x86\\_64 platforms. Tutorial at IndoCrypt. (2011)","DOI":"10.1007\/978-3-642-25578-6_28"},{"issue":"2","key":"9320_CR31","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s13389-014-0090-x","volume":"5","author":"Shay Gueron","year":"2015","unstructured":"Shay Gueron, Vlad Krasnov, Fast prime field elliptic-curve cryptography with 256-bit primes. J. Cryptographic Engineering. 5(2), 141\u2013151 (2015)","journal-title":"J. Cryptographic Engineering"},{"issue":"10","key":"9320_CR32","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/TC.2009.61","volume":"58","author":"Darrel Hankerson","year":"2009","unstructured":"Darrel Hankerson, Koray Karabina, Alfred Menezes, Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields. IEEE Trans. Computers. 58(10), 1411\u20131420 (2009)","journal-title":"IEEE Trans. Computers"},{"key":"9320_CR33","unstructured":"Huseyin Hisil, Joost Renes, On kummer lines with full rational 2-torsion and their usage in cryptography. Cryptology ePrint Archive, Report 2018\/839, (2018). https:\/\/eprint.iacr.org\/2018\/839"},{"key":"9320_CR34","doi-asserted-by":"crossref","unstructured":"Jun ichi Igusa. Theta functions. Springer, 1972.","DOI":"10.1007\/978-3-642-65315-5"},{"key":"9320_CR35","doi-asserted-by":"crossref","unstructured":"Sabyasachi Karati, Palash Sarkar, Kummer for genus one over prime order fields. in Takagi and Peyrin [50], pp. 3\u201332","DOI":"10.1007\/978-3-319-70697-9_1"},{"issue":"177","key":"9320_CR36","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"Neal Koblitz","year":"1987","unstructured":"Neal Koblitz, Elliptic curve cryptosystems. Math. Comp.48(177), 203\u2013209 (1987)","journal-title":"Math. Comp."},{"issue":"3","key":"9320_CR37","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"Neal Koblitz","year":"1989","unstructured":"Neal Koblitz, Hyperelliptic cryptosystems. J. Cryptology. 1(3), 139\u2013150 (1989)","journal-title":"J. Cryptology"},{"key":"9320_CR38","doi-asserted-by":"crossref","unstructured":"Chae Hoon Lim, Pil Joong Lee, A key recovery attack on discrete log-based schemes using a prime order subgroupp. in Burton S. Kaliski Jr., editor, Advances in Cryptology - CRYPTO \u201997, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17\u201321, 1997, Proceedings, volume 1294 of Lecture Notes in Computer Science, (Springer, 1997), pp. 249\u2013263","DOI":"10.1007\/BFb0052240"},{"key":"9320_CR39","doi-asserted-by":"crossref","unstructured":"Patrick Longa, Francesco Sica, Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. in Xiaoyun Wang and Kazue Sako, editors, Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2\u20136, 2012. Proceedings, volume 7658 of Lecture Notes in Computer Science, (Springer, 2012), pp. 718\u2013739","DOI":"10.1007\/978-3-642-34961-4_43"},{"key":"9320_CR40","doi-asserted-by":"crossref","unstructured":"Victor S. Miller, Use of elliptic curves in cryptography. in Advances in Cryptology - CRYPTO\u201985, Santa Barbara, California, USA, August 18\u201322, 1985, Proceedings, (Springer, Berlin Heidelberg, 1985), pp. 417\u2013426","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"177","key":"9320_CR41","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"Peter L Montgomery","year":"1987","unstructured":"Peter\u00a0L. Montgomery, Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation. 48(177), 243\u2013264 (1987)","journal-title":"Mathematics of Computation"},{"issue":"3","key":"9320_CR42","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2005.49","volume":"54","author":"Peter L Montgomery","year":"2005","unstructured":"Peter L. Montgomery, Five, six, and seven-term karatsuba-like formulae. IEEE Trans. Computers. 54(3), 362\u2013369 (2005)","journal-title":"IEEE Trans. Computers"},{"key":"9320_CR43","series-title":"Progress in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-2843-6","volume-title":"Tata Lectures on Theta I","author":"David Mumford","year":"1983","unstructured":"D.\u00a0Mumford. Tata lectures on theta I. Progress in Mathematics 28. Birkh \u00e4user, 1983."},{"key":"9320_CR44","unstructured":"U.S. Department of Commerce\/National Institute of Standards and Technology. Digital Signature Standard (DSS). FIPS-186-3. http:\/\/csrc.nist.gov\/publications\/fips\/fips186-3\/fips_186-3.pdf , 2009."},{"key":"9320_CR45","doi-asserted-by":"crossref","unstructured":"Thomaz Oliveira, Julio L\u00f3pez, Diego\u00a0F. Aranha, Francisco Rodr\u00edguez-Henr\u00edquez, Lambda coordinates for binary elliptic curves. in Bertoni and Coron [8], pp. 311\u2013330","DOI":"10.1007\/978-3-642-40349-1_18"},{"key":"9320_CR46","doi-asserted-by":"crossref","unstructured":"Thomaz Oliveira, Julio L\u00f3pez, Francisco Rodr\u00edguez-Henr\u00edquez, Software implementation of Koblitz curves over quadratic fields. in Benedikt Gierlichs and Axel\u00a0Y. Poschmann, editors, Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17\u201319, 2016, Proceedings, volume 9813 of Lecture Notes in Computer Science, (Springer, 2016), pp. 259\u2013279","DOI":"10.1007\/978-3-662-53140-2_13"},{"key":"9320_CR47","doi-asserted-by":"crossref","unstructured":"Joost Renes, Benjamin Smith, qDSA: Small and secure digital signatures with curve-based Diffie-Hellman key pairs. in Takagi and Peyrin [50], pp. 273\u2013302","DOI":"10.1007\/978-3-319-70697-9_10"},{"key":"9320_CR48","unstructured":"Certicom Research. SEC 2: Recommended elliptic curve domain parameters. http:\/\/www.secg.org\/sec2-v2.pdf , (2010)"},{"issue":"1","key":"9320_CR49","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/PL00003818","volume":"12","author":"Nigel P Smart","year":"1999","unstructured":"Nigel\u00a0P. Smart, Samir Siksek, A fast Diffie-Hellman protocol in genus 2. J. Cryptology. 12(1), 67\u201373 (1999)","journal-title":"J. Cryptology"},{"key":"9320_CR50","doi-asserted-by":"crossref","unstructured":"Tsuyoshi Takagi, Thomas Peyrin, editors. Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3\u20137, 2017, Proceedings, Part II, volume 10625 of Lecture Notes in Computer Science, (Springer, 2017)","DOI":"10.1007\/978-3-319-70697-9"},{"key":"9320_CR51","unstructured":"NUMS: Nothing up my sleeve. https:\/\/tools.ietf.org\/html\/draft-black-tls-numscurves-00"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-019-09320-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-019-09320-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-019-09320-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T10:21:48Z","timestamp":1663237308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-019-09320-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["9320"],"URL":"https:\/\/doi.org\/10.1007\/s00145-019-09320-4","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"19 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}