{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T07:28:04Z","timestamp":1776842884619,"version":"3.51.2"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2005,12]]},"DOI":"10.1007\/s10623-004-4039-4","type":"journal-article","created":{"date-parts":[[2005,10,20]],"date-time":"2005-10-20T10:06:14Z","timestamp":1129802774000},"page":"493-507","source":"Crossref","is-referenced-by-count":13,"title":["On the Number of Trace-One Elements in Polynomial Bases for $$\\mathbb{F}_{2^n}$$"],"prefix":"10.1007","volume":"37","author":[{"given":"Omran","family":"Ahmadi","sequence":"first","affiliation":[]},{"given":"Alfred","family":"Menezes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4039_CR1","unstructured":"ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), American National Standards Institute (1999)."},{"key":"4039_CR2","unstructured":"ANSI X9.63, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography, American National Standards Institute (2001)."},{"key":"4039_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-57936-2_27","volume":"793","author":"I. Blake","year":"1994","journal-title":"Inform. Theory Appl."},{"key":"4039_CR4","doi-asserted-by":"crossref","unstructured":"A. Bluher, A Swan-like Theorem, Finite Fields and their Applications, to appear.","DOI":"10.1016\/j.ffa.2005.02.001"},{"key":"4039_CR5","unstructured":"FIPS 186-2, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-2, National Institute of Standards and Technology (2000)."},{"key":"4039_CR6","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1109\/TC.2004.43","volume":"53","author":"K. Fong","year":"2004","journal-title":"IEEE Trans. Comp."},{"issue":"1758","key":"4039_CR7","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/3-540-46513-8_3","volume":"99","author":"G. Gong","year":"2000","journal-title":"Selected Areas in Cryptography\u2013SAC \u2019"},{"key":"4039_CR8","doi-asserted-by":"crossref","first-page":"2837","DOI":"10.1109\/TIT.2002.804043","volume":"48","author":"G. Gong","year":"2002","journal-title":"IEEE Trans. Inform. Theory"},{"key":"4039_CR9","unstructured":"D. Hankerson, A. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer (2003)."},{"issue":"1716","key":"4039_CR10","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-540-48000-6_12","volume":"99","author":"E. Knudsen","year":"1999","journal-title":"Adv. Cryptology\u2013ASIACRYPT \u2019"},{"key":"4039_CR11","unstructured":"R. Lidl and H. Niederreiter, Finite Fields, Cambridge University Press (1984)."},{"key":"4039_CR12","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1137\/0209024","volume":"9","author":"M. Rabin","year":"1980","journal-title":"SIAM J. Comput."},{"key":"4039_CR13","unstructured":"R. Schroeppel, Elliptic curve point halving wins big, 2nd Midwest Arithmetical Geometry in Cryptography Workshop, Urbana, Illinois (November 2000)."},{"key":"4039_CR14","unstructured":"G. Seroussi, Table of low-weight binary irreducible polynomials, Hewlett-Packard Technical Report HPL-98-135 (1998)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-4039-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-004-4039-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-4039-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:50:04Z","timestamp":1559231404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-004-4039-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,12]]}},"alternative-id":["4039"],"URL":"https:\/\/doi.org\/10.1007\/s10623-004-4039-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,12]]}}}