{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T16:08:52Z","timestamp":1764432532163},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,7,1]],"date-time":"2006-07-01T00:00:00Z","timestamp":1151712000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2006,7]]},"DOI":"10.1007\/s10623-005-6158-y","type":"journal-article","created":{"date-parts":[[2006,5,17]],"date-time":"2006-05-17T13:01:34Z","timestamp":1147870894000},"page":"25-39","source":"Crossref","is-referenced-by-count":11,"title":["On the Number of Optimal Base 2 Representations of Integers"],"prefix":"10.1007","volume":"40","author":[{"given":"Peter J.","family":"Grabner","sequence":"first","affiliation":[]},{"given":"Clemens","family":"Heuberger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6158_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546563","volume-title":"Automatic sequences, theory, applications, generalizations","author":"J-P Allouche","year":"2003"},{"key":"6158_CR2","unstructured":"Ebeid N, Hasan A (2003). Analysis of dpa countermeasures based on randomizing the binary algorithm, Tech Report CORR 2003-14, Centre for Applied Cryptographic Research (CACR), University of Waterloo, available at http:\/\/www.cacr.math.uwaterloo.ca\/techreports\/2003\/corr2003-14.ps"},{"key":"6158_CR3","volume-title":"Probabilistic number theory. I, mean-value theorems, Grundlehren der Mathematischen Wissenschaften","author":"PDTA Elliott","year":"1979"},{"key":"6158_CR4","doi-asserted-by":"crossref","first-page":"974","DOI":"10.2307\/2371641","volume":"61","author":"P Erd\u0151s","year":"1939","journal-title":"Amer J Math"},{"key":"6158_CR5","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/0304-3975(92)00065-Y","volume":"123","author":"P Flajolet","year":"1994","journal-title":"Theor Comput Sci"},{"key":"6158_CR6","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"DM Gordon","year":"1998","journal-title":"J Algorithms"},{"key":"6158_CR7","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1112\/S0025579300012699","volume":"44","author":"PJ Grabner","year":"1997","journal-title":"Mathematika"},{"key":"6158_CR8","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s00365-004-0561-x","volume":"21","author":"PJ Grabner","year":"2005","journal-title":"Constr Approx"},{"key":"6158_CR9","volume-title":"The general theory of Dirichlet\u2019s series. Cambridge Tracts in Mathematics and Mathematical Physics, No. 18","author":"GH Hardy","year":"1964"},{"key":"6158_CR10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s10998-004-0523-x","volume":"49","author":"C Heuberger","year":"2004","journal-title":"Period Math Hungar"},{"key":"6158_CR11","doi-asserted-by":"crossref","unstructured":"Heuberger C, Prodinger H (2006). Analysis of alternative digit sets for nonadjacent representations, to appear in Monatsh Math DOI: 10.1007\/s00605-005-0364-6.","DOI":"10.1007\/s00605-005-0364-6"},{"key":"6158_CR12","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1090\/S0002-9947-1935-1501802-5","volume":"38","author":"B Jessen","year":"1935","journal-title":"Trans Amer Math Soc"},{"key":"6158_CR13","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","journal-title":"Des Codes Cryptogr"},{"key":"6158_CR14","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/BF00052108","volume":"71","author":"G Larcher","year":"1996","journal-title":"Acta Math Hungar"},{"key":"6158_CR15","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F Morain","year":"1990","journal-title":"Inform Theory Appl"},{"key":"6158_CR16","unstructured":"Oswald E, Aigner M (2001). Randomized addition-subtraction chains as a countermeasure against power attacks, Cryptographic hardware and embedded systems\u2014CHES 2001, Paris (Lecture Notes in Computer Science) vol. 2162. Springer, Berlin pp 39\u201350"},{"key":"6158_CR17","first-page":"231","volume-title":"Binary arithmetic, Advances in computers","author":"GW Reitwiesner","year":"1960"},{"key":"6158_CR18","doi-asserted-by":"crossref","unstructured":"Rosenblatt M (1974). Random processes. Springer-Verlag, New York, Graduate Texts in Mathematics, No. 17","DOI":"10.1007\/978-1-4612-9852-6"},{"key":"6158_CR19","volume-title":"Modern computer algebra","author":"J zur Gathen von","year":"1999"},{"key":"6158_CR20","volume-title":"Ergodic theory","author":"P Walters","year":"1982"},{"key":"6158_CR21","volume-title":"Trigonometric Series","author":"A Zygmund","year":"1988"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-005-6158-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-005-6158-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-005-6158-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:05Z","timestamp":1559245805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-005-6158-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,7]]}},"alternative-id":["6158"],"URL":"https:\/\/doi.org\/10.1007\/s10623-005-6158-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,7]]}}}