{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T08:33:49Z","timestamp":1776846829632,"version":"3.51.2"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,4,16]],"date-time":"2010-04-16T00:00:00Z","timestamp":1271376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1007\/s10623-010-9396-6","type":"journal-article","created":{"date-parts":[[2010,4,15]],"date-time":"2010-04-15T04:49:41Z","timestamp":1271306981000},"page":"173-202","source":"Crossref","is-referenced-by-count":7,"title":["Redundant \u03c4-adic expansions I: non-adjacent digit sets and their applications to scalar multiplication"],"prefix":"10.1007","volume":"58","author":[{"given":"Roberto","family":"Avanzi","sequence":"first","affiliation":[]},{"given":"Clemens","family":"Heuberger","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Prodinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,4,16]]},"reference":[{"issue":"8","key":"9396_CR1","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1109\/TC.2002.1024743","volume":"51","author":"E. Al-Daoud","year":"2002","unstructured":"Al-Daoud E., Mahmod R., Rushdan M., Kilicman A.: A new addition formula for elliptic curves over GF(2 n ). IEEE Trans. Comput. 51(8), 972\u2013975 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"9396_CR2","unstructured":"Avanzi R.: Delaying and merging operations in scalar multiplication: applications to curve-based cryptosystems. In: Biham E., Youssef A.M. (eds.) Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Quebec, Canada, August 17\u201318, 2006, Revised Selected Papers, Lecture Notes in Comput. Sci., vol. 4356, pp. 203\u2013219. Springer, Berlin (2007)."},{"key":"9396_CR3","unstructured":"Avanzi R., Ciet M., Sica F.: Faster scalar multiplication on Koblitz curves combining point halving with the Frobenius endomorphism. In: Bao F., Deng R.H., Zhou J. (eds.) Public Key Cryptography\u2014PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1\u20134, 2004, Lecture Notes in Comput. Sci., vol. 2947, pp. 28\u201340. Springer (2004)."},{"key":"9396_CR4","unstructured":"Avanzi R., Cohen H., Doche C., Frey G., Lange T., Nguyen K.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press Series on Discrete Mathematics and its Applications, vol. 34. Chapman & Hall\/CRC, Boca Raton, FL (2005)."},{"key":"9396_CR5","unstructured":"Avanzi R., Dimitrov V., Doche C., Sica F.: Extending scalar multiplication using double bases. In: Lai X., Chen K. (eds.) Advances in Cryptology\u2014ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3\u20137, 2006, Proceedings Lecture Notes in Comput. Sci., vol. 4284, pp. 130\u2013144. Springer (2006)."},{"key":"9396_CR6","unstructured":"Avanzi R., Heuberger C., Prodinger H.: Minimality of the Hamming weight of the \u03c4-NAF for Koblitz curves and improved combination with point halving. In: Preneel B., Tavares St. (eds.) Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11\u201312, 2005, Revised Selected Papers, Lecture Notes in Comput. Sci., vol. 3897, pp. 332\u2013344. Springer, Berlin (2006)."},{"key":"9396_CR7","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s00453-006-0105-9","volume":"46","author":"R. Avanzi","year":"2006","unstructured":"Avanzi R., Heuberger C., Prodinger H.: Scalar multiplication on Koblitz curves. Using the Frobenius endomorphism and its combination with point halving: Extensions and mathematical analysis. Algorithmica 46, 249\u2013270 (2006)","journal-title":"Algorithmica"},{"key":"9396_CR8","unstructured":"Avanzi R., Heuberger C., Prodinger H.: On redundant \u03c4-adic expansions and non-adjacent digit sets. In: Biham E., Youssef A.M. (eds.) Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Quebec, Canada, August 17\u201318, 2006, Revised Selected Papers, Lecture Notes in Comput. Sci., vol. 4356, pp. 285\u2013301. Springer, Berlin (2007)."},{"key":"9396_CR9","unstructured":"Avanzi R., Sica F.: Scalar multiplication on Koblitz curves using double bases. In: Nguyen P.Q. (ed.) Progress in Cryptology\u2014VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25\u201328, 2006, Revised Selected Papers, Lecture Notes in Comput. Sci., vol. 4341, pp. 131\u2013146. Springer (2006)."},{"key":"9396_CR10","unstructured":"Avanzi R., Th\u00e9riault N.: Effects of optimizations for software implementations of small binary field arithmetic. In: Carlet C., Sunar B. (eds.) WAIFI 2007: International Workshop on the Arithmetic of Finite Fields, Lecture Notes in Comput. Sci., vol. 4547, pp. 69\u201384. Springer, Berlin (2007)."},{"issue":"3","key":"9396_CR11","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1515\/JMC.2008.011","volume":"2","author":"R. Avanzi","year":"2008","unstructured":"Avanzi R., Th\u00e9riault N., Wang Z.: Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formul\u00e6. J. Math. Cryptol. 2(3), 227\u2013255 (2008)","journal-title":"J. Math. Cryptol."},{"key":"9396_CR12","unstructured":"Avoine G., Monnerat J., Peyrin, Th.: Advances in alternative non-adjacent form representations. Progress in cryptology\u2014INDOCRYPT 2004, Lecture Notes in Comput. Sci., vol. 3348, pp. 260\u2013274. Springer, Berlin (2004)."},{"key":"9396_CR13","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.ipl.2005.05.013","volume":"95","author":"I.F. Blake","year":"2005","unstructured":"Blake I.F., Murty V.K., Xu G.: A note on window \u03c4-NAF algorithm. Inform. Process. Lett. 95, 496\u2013502 (2005)","journal-title":"Inform. Process. Lett."},{"issue":"4","key":"9396_CR14","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/BF02124750","volume":"5","author":"R.M. Corless","year":"1996","unstructured":"Corless R.M., Gonnet G.H., Hare D.E.G., Jeffrey D.J., Knuth D.E.: On the Lambert W function. Adv. Comput. Math. 5(4), 329\u2013359 (1996)","journal-title":"Adv. Comput. Math."},{"key":"9396_CR15","unstructured":"Coron J.-S., M\u2019Ra\u00efhi D., Tymen C.: Fast generation of pairs (k,[k]P) for Koblitz elliptic curves. In: Vaudenay S., Youssef A.M. (eds.) Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16\u201317, 2001, Revised Papers, Lecture Notes in Comput. Sci., vol. 2259, pp. 151\u2013164. Springer, Berlin (2001)."},{"issue":"1","key":"9396_CR16","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/0022-247X(81)90262-6","volume":"83","author":"W.J. Gilbert","year":"1981","unstructured":"Gilbert W.J.: Radix representations of quadratic fields. J. Math. Anal. Appl. 83(1), 264\u2013274 (1981)","journal-title":"J. Math. Anal. Appl."},{"key":"9396_CR17","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s11786-009-0014-9","volume":"3","author":"C. Heuberger","year":"2010","unstructured":"Heuberger C.: Redundant \u03c4-adic expansions II: Non-optimality and chaotic behaviour. Math. Comput. Sci. 3, 141\u2013157 (2010)","journal-title":"Math. Comput. Sci."},{"key":"9396_CR18","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s00605-005-0364-6","volume":"147","author":"C. Heuberger","year":"2006","unstructured":"Heuberger C., Prodinger H.: Analysis of alternative digit sets for nonadjacent representations. Monatsh. Math. 147, 219\u2013248 (2006)","journal-title":"Monatsh. Math."},{"key":"9396_CR19","unstructured":"IEEE Std 1363-2000: IEEE standard specifications for public-key cryptography. IEEE Computer Society, August 29 (2000)."},{"key":"9396_CR20","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF01904880","volume":"37","author":"I. K\u00e1tai","year":"1981","unstructured":"K\u00e1tai I., Kov\u00e1cs B.: Canonical number systems in imaginary quadratic fields. Acta Math. Hungar. 37, 159\u2013164 (1981)","journal-title":"Acta Math. Hungar."},{"key":"9396_CR21","first-page":"255","volume":"37","author":"I. K\u00e1tai","year":"1975","unstructured":"K\u00e1tai I., Szab\u00f3 J.: Canonical number systems for complex integers. Acta Sci. Math. (Szeged) 37, 255\u2013260 (1975)","journal-title":"Acta Sci. Math. (Szeged)"},{"key":"9396_CR22","unstructured":"Knudsen E.W.: Elliptic scalar multiplication using point halving. In: Lam K.-Y., Okamoto E., Xing C. (eds.) Advances in Cryptology\u2014 ASIACRYPT \u201999, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14\u201318, 1999, Proceedings, Lecture Notes in Comput. Sci., vol. 1716, pp. 135\u2013149. Springer, Berlin (1999)."},{"issue":"177","key":"9396_CR23","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz N.: Elliptic curve cryptosystems. Math. Comp. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"9396_CR24","unstructured":"Koblitz N.: CM-curves with good cryptographic properties. In: Feigenbaum J. (ed.) Advances in Cryptology\u2014CRYPTO \u201991, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11\u201315, 1991, Proceedings, Lecture Notes in Comput. Sci., vol. 576, pp. 279\u2013287. Springer, Berlin (1992)."},{"key":"9396_CR25","unstructured":"L\u00f3pez J., Dahab R.: Improved algorithms for elliptic curve arithmetic in $${{GF}\\left(2^n\\right)}$$ . Selected areas in cryptography (Kingston, ON, 1998), Lecture Notes in Comput. Sci., vol. 1556, pp. 201\u2013212. Springer, Berlin (1999)."},{"issue":"4","key":"9396_CR26","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.1145\/322344.322355","volume":"29","author":"D.W. Matula","year":"1982","unstructured":"Matula D.W.: Basic digit sets for radix representation. J. Assoc. Comput. Mach. 29(4), 1131\u20131143 (1982)","journal-title":"J. Assoc. Comput. Mach."},{"key":"9396_CR27","unstructured":"Meier W., Staffelbach O.: Efficient multiplication on certain nonsupersingular elliptic curves. In: Brickell E.F. (ed.) Advances in Cryptology\u2014CRYPTO \u201992, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16\u201320, 1992, Proceedings, Lecture Notes in Comput. Sci., vol. 740, pp. 333\u2013344. Springer, Berlin (1993)."},{"key":"9396_CR28","unstructured":"Miller V.S.: Use of elliptic curves in cryptography. In: Williams H.C. (ed.) Advances in Cryptology\u2014CRYPTO \u201985, Santa Barbara, California, USA, August 18\u201322, 1985, Proceedings, Lecture Notes in Comput. Sci., vol. 218, pp. 417\u2013426. Springer, Berlin (1986)."},{"key":"9396_CR29","unstructured":"Muir J.A., Stinson D.R.: Alternative digit sets for nonadjacent representations. In: Matsui M., Zuccherato R.J. (eds.) Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14\u201315, 2003, Revised Papers, Lecture Notes in Comput. Sci., vol. 3006, pp. 306\u2013319. Springer, Berlin (2004)."},{"key":"9396_CR30","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1137\/S0895480103437651","volume":"19","author":"J.A. Muir","year":"2005","unstructured":"Muir J.A., Stinson D.R.: Alternative digit sets for nonadjacent representations. SIAM J. Discrete Math. 19, 165\u2013191 (2005)","journal-title":"SIAM J. Discrete Math."},{"key":"9396_CR31","unstructured":"National Institute of Standards and Technology: Digital signature standard, FIPS Publication, vol. 186\u20132, February (2000)."},{"key":"9396_CR32","unstructured":"Okeya K., Takagi T., Vuillaume C.: Short memory scalar multiplication on Koblitz curves. In: Rao J.R., Sunar B. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2005, 7th International Workshop, Edinburgh, UK, August 29\u2013September 1, 2005, Proceedings, Lecture Notes in Comput. Sci., vol. 3659, pp. 91\u2013105. Springer, Berlin (2005)."},{"key":"9396_CR33","unstructured":"Park D.J., Sim S.G., Lee P.J.: Fast scalar multiplication method using change-of-basis matrix to prevent power analysis attacks on koblitz curves. In: Chae K., Yung M. (eds.) Information Security Applications 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25\u201327, 2003, Revised Papers, Lecture Notes in Comput. Sci., vol. 2908, pp. 474\u2013488. Springer (2004)."},{"key":"9396_CR34","unstructured":"Schroeppel R.: Elliptic curve point ambiguity resolution apparatus and method. International Application Number PCT\/US00\/31014, filed 9 November (2000)."},{"key":"9396_CR35","unstructured":"Schroeppel R.: Point halving wins big, Talk at the ECC 2001 Workshop, University of Waterloo, Ontario, Canada, October 29\u201331, (2001)."},{"key":"9396_CR36","unstructured":"Solinas J.A.: An improved algorithm for arithmetic on a family of elliptic curves. In: Kaliski B.S., Jr. (ed.) Advances in Cryptology\u2014CRYPTO \u201997. 17th Annual International Cryptology Conference. Santa Barbara, CA, USA. August 17\u201321, 1997. Proceedings, Lecture Notes in Comput. Sci., vol. 1294, pp. 357\u2013371. Springer, Berlin (1997)."},{"key":"9396_CR37","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"J.A. Solinas","year":"2000","unstructured":"Solinas J.A.: Efficient arithmetic on Koblitz curves, Des. Codes Cryptogr. 19, 195\u2013249 (2000)","journal-title":"Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9396-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9396-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9396-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:28Z","timestamp":1559246308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9396-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,16]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["9396"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9396-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,16]]}}}