{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T15:30:51Z","timestamp":1649172651995},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,10,9]],"date-time":"2007-10-09T00:00:00Z","timestamp":1191888000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2007,10,17]]},"DOI":"10.1007\/s10623-007-9101-6","type":"journal-article","created":{"date-parts":[[2007,10,8]],"date-time":"2007-10-08T16:30:21Z","timestamp":1191861021000},"page":"271-296","source":"Crossref","is-referenced-by-count":4,"title":["On \u03c4-adic representations of integers"],"prefix":"10.1007","volume":"45","author":[{"given":"Nevine Maurice","family":"Ebeid","sequence":"first","affiliation":[]},{"given":"M. Anwar","family":"Hasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,10,9]]},"reference":[{"key":"9101_CR1","unstructured":"Biggs N (1993) Algebraic graph theory. Cambridge University Press"},{"key":"9101_CR2","unstructured":"Ebeid N, Hasan MA (2003) Analysis of DPA countermeasures based on randomizing the binary algorithm. CACR Technical Reports CORR 2003-14, University of Waterloo"},{"key":"9101_CR3","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s10623-006-9014-9","volume":"42","author":"N Ebeid","year":"2007","unstructured":"Ebeid N and Hasan MA (2007). On binary signed digit representations of integers. Design Code Cryptogr 42: 43\u201365","journal-title":"Design Code Cryptogr"},{"key":"9101_CR4","doi-asserted-by":"crossref","unstructured":"Fouque P-A, Muller F, Poupard G, Valette F (2004) Defeating countermeasures based on randomized BSD representations. In: Cryptographic hardware and embedded systems\u2014CHES \u201904, vol 3156 of LNCS, Springer-Verlag, pp 312\u2013327","DOI":"10.1007\/978-3-540-28632-5_23"},{"issue":"1","key":"9101_CR5","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"DM Gordon","year":"1998","unstructured":"Gordon DM (1998). A survey of fast exponentiation methods. J Algorithm 27(1): 129\u2013146","journal-title":"J Algorithm"},{"key":"9101_CR6","unstructured":"Ha J, Moon S (2002) Randomized signed-scalar multiplication of ECC to resist power attacks. In: Cryptographic hardware and embedded systems\u2014CHES \u201902, vol 2523 of LNCS, Springer-Verlag, pp 551\u2013563"},{"key":"9101_CR7","doi-asserted-by":"crossref","unstructured":"Hopcroft JE, Motwani R, Ullman JD (2001) Introduction to Automata theory, Languages, and computation, 2nd edn. Addison-Wesley","DOI":"10.1145\/568438.568455"},{"key":"9101_CR8","doi-asserted-by":"crossref","unstructured":"Kalbfleisch JG (1985) Probability and statistical inference, vol 1. Probability. Springer-Verlag","DOI":"10.1007\/978-1-4612-1096-2_1"},{"key":"9101_CR9","unstructured":"Knuth DE (1973) The art of computer programming\/seminumerical algorithms, vol 2, 2nd edn. Addison-Wesley"},{"key":"9101_CR10","doi-asserted-by":"crossref","unstructured":"Koblitz N (1992) CM curves with good cryptographic properties. In: Advances in cryptology\u2014CRYPTO \u201991, vol 576 of LNCS, Springer-Verlag, pp 279\u2013287","DOI":"10.1007\/3-540-46766-1_22"},{"key":"9101_CR11","doi-asserted-by":"crossref","DOI":"10.1002\/9781118033067","volume-title":"Fibonacci and Lucas numbers with applications","author":"T Koshy","year":"2001","unstructured":"Koshy T (2001). Fibonacci and Lucas numbers with applications. Wiley, New York"},{"key":"9101_CR12","unstructured":"National Institute of Standards and Technology. FIPS-186-2: Digital Signature Standard (DSS), Jan. 2000"},{"key":"9101_CR13","unstructured":"Lee PJ, Sim SG, Park DJ (2004) New power analysis on the Ha-Moon algorithm and the MIST algorithm. In: Information and communications security\u2014ICICS \u201904, vol 3269 of LNCS, Springer-Verlag, pp 291\u2013304"},{"key":"9101_CR14","unstructured":"Shallit J (2006) Personal communication. May, 2006"},{"key":"9101_CR15","volume-title":"Introduction to the theory of computation","author":"M Sipser","year":"1997","unstructured":"Sipser M (1997). Introduction to the theory of computation. PWS Pub. Co, Boston"},{"key":"9101_CR16","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"JA Solinas","year":"2000","unstructured":"Solinas JA (2000). Efficient arithmetic on Koblitz curves. Design Code Cryptogr 19: 195\u2013249","journal-title":"Design Code Cryptogr"},{"key":"9101_CR17","unstructured":"Staffelbach WMO (1993) Efficient multiplication on certain nonsupersingular elliptic curves. In: Advances in cryptology\u2014CRYPTO \u201992, vol 740 of LNCS, Springer-Verlag, pp 333\u2013344"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9101-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-007-9101-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9101-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:08Z","timestamp":1559245808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-007-9101-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,9]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,10,17]]}},"alternative-id":["9101"],"URL":"https:\/\/doi.org\/10.1007\/s10623-007-9101-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,10,9]]}}}