{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T08:00:06Z","timestamp":1776844806332,"version":"3.51.2"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,6,23]],"date-time":"2009-06-23T00:00:00Z","timestamp":1245715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1007\/s10623-009-9310-2","type":"journal-article","created":{"date-parts":[[2009,6,22]],"date-time":"2009-06-22T05:34:42Z","timestamp":1245648882000},"page":"83-99","source":"Crossref","is-referenced-by-count":12,"title":["On the number of distinct elliptic curves in some families"],"prefix":"10.1007","volume":"54","author":[{"given":"Reza","family":"Rezaeian Farashahi","sequence":"first","affiliation":[]},{"given":"Igor E.","family":"Shparlinski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,23]]},"reference":[{"key":"9310_CR1","volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","author":"R. Avanzi","year":"2005","unstructured":"Avanzi R., Cohen H., Doche C., Frey G., Lange T., Nguyen K., Vercauteren F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton, FL (2005)"},{"key":"9310_CR2","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Lange T.: Faster addition and doubling on elliptic curves. In: Proc. Asiacrypt\u20192007. Lect. Notes in Comp. Sci., vol. 4833, pp. 29\u201350. Springer, Berlin (2007).","DOI":"10.1007\/978-3-540-76900-2_3"},{"key":"9310_CR3","unstructured":"Bernstein D.J., Lange T.: Inverted Edwards coordinates. In: Proc. AAECC\u20192007. Lect. Notes in Comp. Sci., vol. 4851, pp. 20\u201327. Springer, Berlin (2007)."},{"key":"9310_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1090\/conm\/461\/08979","volume-title":"Finite Fields and Applications. Contemp. Math., vol. 461","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein D.J., Lange T.: Analysis and optimization of elliptic-curve single-scalar multiplication. In: Mullen, G.L., Panario, D., Shparlinski, I.E. (eds) Finite Fields and Applications. Contemp. Math., vol. 461, pp. 1\u201320. Amer. Math. Soc., Providence, RI (2008)"},{"key":"9310_CR5","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Birkner P., Joye M., Lange T., Peters C.: Twisted Edwards curves. In: Proc. Africacrypt\u20192008. Lect. Notes in Comp. Sci., vol. 5023, pp. 389\u2013405. Springer, Berlin (2008).","DOI":"10.1007\/978-3-540-68164-9_26"},{"key":"9310_CR6","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Lange T., Rezaeian Farashahi R.: Binary Edwards curves. In: CHES\u20192008. Lect. Notes in Comp. Sci., vol. 5154, pp. 244\u2013265. Springer, Berlin (2008).","DOI":"10.1007\/978-3-540-85053-3_16"},{"key":"9310_CR7","unstructured":"Castryck W., Hubrechts H.: The distribution of the number of points modulo an integer on elliptic curves over finite fields. Preprint (2009). Available from http:\/\/arxiv.org\/abs\/0902.4332 . Accessed 25 Feb 2009"},{"key":"9310_CR8","doi-asserted-by":"crossref","first-page":"255","DOI":"10.4064\/aa-17-3-255-271","volume":"17","author":"S.D. Cohen","year":"1970","unstructured":"Cohen S.D.: The distribution of polynomials over finite fields. Acta Arith. 17, 255\u2013271 (1970)","journal-title":"Acta Arith."},{"key":"9310_CR9","unstructured":"Doche C., Icart T., Kohel D.R.: Efficient scalar multiplication by isogeny decompositions. In: PKC\u20192006. Lect. Notes in Comp. Sci., vol. 3958, pp. 191\u2013206. Springer, Berlin (2006)."},{"key":"9310_CR10","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"H.M. Edwards","year":"2007","unstructured":"Edwards H.M.: A normal form for elliptic curves. Bull. Amer. Math. Soc. 44, 393\u2013422 (2007)","journal-title":"Bull. Amer. Math. Soc."},{"key":"9310_CR11","volume-title":"Finite Fields","author":"R. Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Fields. Cambridge University Press, Cambridge (1997)"},{"key":"9310_CR12","volume-title":"The Arithmetic of Elliptic Curves","author":"J.H. Silverman","year":"1995","unstructured":"Silverman J.H.: The Arithmetic of Elliptic Curves. Springer, Berlin (1995)"},{"key":"9310_CR13","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1137\/S009753979427741X","volume":"28","author":"J. zur Gathen von","year":"1998","unstructured":"von zur Gathen J., Shparlinski I.E.: Computing components and projections of curves over finite fields. SIAM J. Comput. 28, 822\u2013840 (1998)","journal-title":"SIAM J. Comput."},{"key":"9310_CR14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/BF01202042","volume":"6","author":"J. zur Gathen von","year":"1996","unstructured":"von zur Gathen J., Karpinski M., Shparlinski I.E.: Counting curves and their projections. Comput. Complex. 6, 64\u201399 (1996)","journal-title":"Comput. Complex."},{"key":"9310_CR15","doi-asserted-by":"crossref","DOI":"10.1201\/9781420071474","volume-title":"Elliptic Curves: Number Theory and Cryptography","author":"L.C. Washington","year":"2008","unstructured":"Washington L.C.: Elliptic Curves: Number Theory and Cryptography. CRC Press, Boca Raton, FL (2008)"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9310-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-009-9310-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9310-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:26Z","timestamp":1559231906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-009-9310-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,23]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["9310"],"URL":"https:\/\/doi.org\/10.1007\/s10623-009-9310-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,23]]}}}