{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T01:10:35Z","timestamp":1691629835848},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2015,5,3]],"date-time":"2015-05-03T00:00:00Z","timestamp":1430611200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s10623-015-0078-2","type":"journal-article","created":{"date-parts":[[2015,5,2]],"date-time":"2015-05-02T08:12:40Z","timestamp":1430554360000},"page":"427-439","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Isogenies of abelian varieties over finite fields"],"prefix":"10.1007","volume":"77","author":[{"given":"Alice","family":"Silverberg","sequence":"first","affiliation":[]},{"given":"Yuri G.","family":"Zarhin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,3]]},"reference":[{"key":"78_CR1","doi-asserted-by":"crossref","unstructured":"Chow W.L.: Abelian varieties over function fields. Trans. Am. Math. Soc. 78, 253\u2013275 (1955).","DOI":"10.1090\/S0002-9947-1955-0067527-3"},{"key":"78_CR2","doi-asserted-by":"crossref","unstructured":"Cohen H., Frey G. et al. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall\/CRC, Boca Raton (2006).","DOI":"10.1201\/9781420034981"},{"key":"78_CR3","doi-asserted-by":"crossref","unstructured":"Chai C.-L., Conrad B., Oort F.: Complex multiplication and lifting problems. Mathematical Surveys and Monographs 195. American Mathematical Society, Providence (2014).","DOI":"10.1090\/surv\/195\/05"},{"key":"78_CR4","unstructured":"Curtis C.W., Reiner I.: Methods of Representation Theory\u2014with Applications to Finite Groups and Orders, vol. I. Wiley, New York (1981)."},{"key":"78_CR5","doi-asserted-by":"crossref","unstructured":"Galbraith S.D., Pujolas J., Ritzenthaler C., Smith B.A.: Distortion maps for genus two curves. J. Math. Cryptol. 3, 1\u201318 (2009).","DOI":"10.1515\/JMC.2009.001"},{"key":"78_CR6","doi-asserted-by":"crossref","unstructured":"Hoffstein J., Pipher J., Silverman J.: An Introduction to Mathematical Cryptography. Springer, New York (2008).","DOI":"10.1007\/978-0-387-77993-5_6"},{"key":"78_CR7","doi-asserted-by":"crossref","unstructured":"Lang S.: Abelian Varieties, 2nd edn. Springer, New York (1983).","DOI":"10.1007\/978-1-4419-8534-7"},{"key":"78_CR8","unstructured":"Mumford D.: Abelian Varieties, Tata Institute of Fundamental Research Studies in Mathematics No. 5. Oxford University Press, London (1970)."},{"key":"78_CR9","unstructured":"Oort F.: Abelian varieties over finite fields. In: Higher-dimensional geometry over finite fields, pp. 123\u2013188, NATO Sci. Peace Secur. Ser. D Inf. Commun. Secur., 16, IOS, Amsterdam (2008). http:\/\/www.staff.science.uu.nl\/~oort0109\/A-AVffGoe07-2-oort.ps ."},{"key":"78_CR10","unstructured":"Serre J-P.: Rigidit\u00e9 du foncteur de Jacobi d\u2019echelon $$n \\ge 3$$ n \u2265 3 , Appendix to A. Grothendieck, Techniques de construction en g\u00e9om\u00e9trie analytique, X. Construction de l\u2019espace de Teichm\u00fcller, S\u00e9minaire Henri Cartan, 1960\/61, no. 17. http:\/\/numdam.org\/numdam-bin\/fitem?id=SHC_1960-1961__13_2_A4_0 ."},{"key":"78_CR11","unstructured":"Shimura G., Taniyama Y.: Complex multiplication of abelian varieties and its application to number theory. Publ. Math. Soc. Jpn, vol. 6, Tokyo (1961)."},{"key":"78_CR12","doi-asserted-by":"crossref","unstructured":"Silverberg A.: Fields of definition for homomorphisms of abelian varieties. J. Pure Appl. Algebra 77, 253\u2013262 (1992).","DOI":"10.1016\/0022-4049(92)90141-2"},{"key":"78_CR13","doi-asserted-by":"crossref","unstructured":"Silverberg A., Zarhin Y.G.: Isogenies of abelian varieties. J. Pure Appl. Algebra 90, 23\u201337 (1993).","DOI":"10.1016\/0022-4049(93)90133-E"},{"key":"78_CR14","doi-asserted-by":"crossref","unstructured":"Silverberg A., Zarhin Y.G.: Variations on a theme of Minkowski and Serre. J. Pure Appl. Algebra 111, 285\u2013302 (1996).","DOI":"10.1016\/0022-4049(95)00113-1"},{"key":"78_CR15","doi-asserted-by":"crossref","unstructured":"Silverberg A., Zarhin Y.G: Semistable reduction and torsion subgroups of abelian varieties. Ann. Inst. Fourier 45, 403\u2013420 (1995).","DOI":"10.5802\/aif.1459"},{"key":"78_CR16","doi-asserted-by":"crossref","unstructured":"Silverman J.H.: The arithmetic of elliptic curves. Grad. Texts Math, vol. 106, Springer, New York (1986).","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"78_CR17","unstructured":"Tate J.: Endomorphisms of abelian varieties over finite fields. Invent. math. 2, 134\u2013144 (1966)."},{"key":"78_CR18","doi-asserted-by":"crossref","unstructured":"Verheul E. R.: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. In: Pfitzmann B. (ed.) Advances in Cryptology\u2014EUROCRYPT 2001. Lecture Notes in Computer Science, vol. 2045, pp. 195\u2013210. Springer, Berlin (2001).","DOI":"10.1007\/3-540-44987-6_13"},{"key":"78_CR19","unstructured":"Weil A.: Vari\u00e9t\u00e9s Ab\u00e9liennes et Courbes Alg\u00e9briques. Hermann, Paris (1948)."},{"key":"78_CR20","unstructured":"Weil A.: Foundations of Algebraic Geometry, 2nd edn. American Mathematical Society, Providence (1962)."},{"key":"78_CR21","doi-asserted-by":"crossref","unstructured":"Weil A.: Adeles and Algebraic Groups, Progress in Mathematics, vol. 23. Birkh\u00e4user, Boston, Basel, Stuttgart (1982).","DOI":"10.1007\/978-1-4684-9156-2"},{"key":"78_CR22","unstructured":"Zarhin Y.G.: Homomorphisms of abelian varieties. In: Aubry Y., Lachaud G. (eds.) Arithmetic, Geometry and Coding Theory (AGCT 2003), S\u00e9min. Congr. vol. 11, pp. 189\u2013215. Soc. Math. France (2005)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0078-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0078-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0078-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T00:52:13Z","timestamp":1691628733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0078-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,3]]},"references-count":22,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["78"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0078-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,3]]}}}