{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:21:24Z","timestamp":1740122484460,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,7,12]],"date-time":"2016-07-12T00:00:00Z","timestamp":1468281600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001711","name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","doi-asserted-by":"publisher","award":["123393","150207"],"award-info":[{"award-number":["123393","150207"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung (CH)","award":["151884"],"award-info":[{"award-number":["151884"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10623-016-0249-9","type":"journal-article","created":{"date-parts":[[2016,7,12]],"date-time":"2016-07-12T06:53:11Z","timestamp":1468306391000},"page":"519-548","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An optimal representation for the trace zero subgroup"],"prefix":"10.1007","volume":"83","author":[{"given":"Elisa","family":"Gorla","sequence":"first","affiliation":[]},{"given":"Maike","family":"Massierer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"key":"249_CR1","doi-asserted-by":"crossref","unstructured":"Avanzi R.M., Cesena E.: Trace zero varieties over fields of characteristic 2 for cryptographic applications. In: Proceedings of the First Symposium on Algebraic Geometry and Its Applications (SAGA \u201907), pp. 188\u2013215 (2007).","DOI":"10.1142\/9789812793430_0010"},{"key":"249_CR2","doi-asserted-by":"crossref","unstructured":"Avanzi R., Cohen H., Doche C., Frey G., Lange T., Nguyen K., Vercauteren F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Discrete Mathematics and Its Applications. Chapman & Hall\/CRC, Boca Raton (2006).","DOI":"10.1201\/9781420034981"},{"key":"249_CR3","doi-asserted-by":"crossref","unstructured":"Barreto P.S.L.M., Voloch J.S.: Efficient computation of roots in finite fields. Des. Codes Cryptogr. 39(2), 275\u2013280 (2006).","DOI":"10.1007\/s10623-005-4017-5"},{"key":"249_CR4","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Duif N., Lange T., Schwabe P., Yang B.-Y.: High-speed high-security signatures. J. Cryptogr. Eng. 2(2), 77\u201389 (2012).","DOI":"10.1007\/s13389-012-0027-1"},{"key":"249_CR5","unstructured":"Blady G.: Die Weil-Restriktion elliptischer Kurven in der Kryptographie. Master\u2019s thesis, Universit\u00e4t GHS Essen, Dresden (2002)."},{"key":"249_CR6","doi-asserted-by":"crossref","unstructured":"Bos J.W., Costello C., Hisil H., Lauter K.: High-performance scalar multiplication using 8-dimensional GLV\/GLS decomposition. In: Bertoni G., Coron J.-S. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2013. LNCS, vol. 8086, pp. 331\u2013338. Springer, Berlin (2013).","DOI":"10.1007\/978-3-642-40349-1_19"},{"key":"249_CR7","doi-asserted-by":"crossref","unstructured":"Bosma W., Cannon J., Playoust C.: The Magma algebra system. I. The user language. J. Symb. Comput. 24, 235\u2013265 (1997).","DOI":"10.1006\/jsco.1996.0125"},{"key":"249_CR8","doi-asserted-by":"crossref","unstructured":"Cantor D.G.: Computing in the Jacobian of a hyperelliptic curve. Math. Comput. 48(177), 95\u2013101 (1987).","DOI":"10.1090\/S0025-5718-1987-0866101-0"},{"key":"249_CR9","unstructured":"Cesena E.: Pairing with supersingular trace zero varieties revisited, http:\/\/eprint.iacr.org\/2008\/404 (2008)."},{"key":"249_CR10","unstructured":"Cesena E.: Trace zero varieties in pairing-based cryptography. Ph.D. thesis, Universit\u00e0 degli studi Roma Tre, Roma, http:\/\/ricerca.mat.uniroma3.it\/dottorato\/Tesi\/tesicesena.pdf (2010)."},{"key":"249_CR11","unstructured":"Diem C., Scholten J.: An attack on a trace-zero cryptosystem, http:\/\/www.math.uni-leipzig.de\/diem\/preprints ."},{"key":"249_CR12","unstructured":"Diem C.: The GHS attack in odd characteristic. Ramanujan Math. Soc. 18(1), 1\u201332 (2003)."},{"key":"249_CR13","doi-asserted-by":"crossref","unstructured":"Diem C.: On the discrete logarithm problem in class groups of curves. Math. Comput. 80, 443\u2013475 (2011).","DOI":"10.1090\/S0025-5718-2010-02281-1"},{"key":"249_CR14","doi-asserted-by":"crossref","unstructured":"Eagle P.N.J., Galbraith S.D., Ong J.: Point compression for Koblitz curves. Adv. Math. Commun. 5(1), 1\u201310 (2011).","DOI":"10.3934\/amc.2011.5.1"},{"key":"249_CR15","doi-asserted-by":"crossref","unstructured":"Enge A., Gaudry P., Thom\u00e9 E.: An $${L}(1\/3)$$ L ( 1 \/ 3 ) discrete logarithm algorithm for low degree curves. J. Cryptol. 24, 24\u201341 (2011).","DOI":"10.1007\/s00145-010-9057-y"},{"key":"249_CR16","doi-asserted-by":"crossref","unstructured":"Faz-Hern\u00e1ndez A., Longa P., S\u00e1nchez A.H.: Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves. In: Topics in Cryptology CT-RSA. LNCS, vol. 8366, pp. 1\u201327, Springer, Berlin (2014).","DOI":"10.1007\/978-3-319-04852-9_1"},{"key":"249_CR17","unstructured":"Frey G.: Applications of arithmetical geometry to cryptographic constructions. In: Proceedings of the 5th International Conference on Finite Fields and Applications, pp.\u00a0128\u2013161. Springer, Berlin (1999)."},{"key":"249_CR18","doi-asserted-by":"crossref","unstructured":"Galbraith S.D., Lin X.: Computing pairings using $$x$$ x -coordinates only. Des. Codes Crytogr. 50(3), 305\u2013324 (2009).","DOI":"10.1007\/s10623-008-9233-3"},{"key":"249_CR19","doi-asserted-by":"crossref","unstructured":"Galbraith S.D., Lin X., Scott M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves. J. Cryptol. 24(3), 446\u2013469 (2011).","DOI":"10.1007\/s00145-010-9065-y"},{"key":"249_CR20","doi-asserted-by":"crossref","unstructured":"Gallant R.P., Lambert R.J., Vanstone S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian J. (ed.) Advances in Cryptology: Proceedings of CRYPTO \u201901. LNCS, vol. 2139, pp. 190\u2013200, Springer, Berlin (2001).","DOI":"10.1007\/3-540-44647-8_11"},{"key":"249_CR21","doi-asserted-by":"crossref","unstructured":"Gaudry P.: Fast genus 2 arithmetic based on theta functions. J. Math. Cryptol. 1, 243\u2013265 (2007).","DOI":"10.1515\/JMC.2007.012"},{"key":"249_CR22","doi-asserted-by":"crossref","unstructured":"Gaudry P.: Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem. J. Symb. Comput. 44(12), 1690\u20131702 (2009).","DOI":"10.1016\/j.jsc.2008.08.005"},{"key":"249_CR23","doi-asserted-by":"crossref","unstructured":"Gaudry P., Hess F., Smart N.P.: Constructive and destructive facets of Weil descent. J. Cryptol. 15(1), 19\u201346 (2002).","DOI":"10.1007\/s00145-001-0011-x"},{"key":"249_CR24","doi-asserted-by":"crossref","unstructured":"Gong G., Harn L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inf. Theory 45(7), 2601\u20132605 (1999).","DOI":"10.1109\/18.796413"},{"key":"249_CR25","doi-asserted-by":"crossref","unstructured":"Gorla E., Massierer M.: Index calculus in the trace zero variety. Adv. Math. Commun. 9(4), 515\u2013539 (2015).","DOI":"10.3934\/amc.2015.9.515"},{"key":"249_CR26","doi-asserted-by":"crossref","unstructured":"Gorla E., Massierer M.: Point compression for the trace zero subgroup over a small degree extension field. Des. Codes Cryptogr. 75(2), 335\u2013357 (2015).","DOI":"10.1007\/s10623-014-9921-0"},{"key":"249_CR27","doi-asserted-by":"crossref","unstructured":"Hess F., Seroussi G., Smart N.P.: Two topics in hyperelliptic cryptography. In: Vaudenay S., Youssef A.M. (eds.) Proceedings of SAC \u201901. LNCS, vol. 2259, pp.\u00a0181\u2013189. Springer, Berlin (2001).","DOI":"10.1007\/3-540-45537-X_14"},{"key":"249_CR28","doi-asserted-by":"crossref","unstructured":"Karabina K.: Factor-4 and 6 compression of cyclotomic subgroups of $$\\mathbb{F}_{2^{4m}}^*$$ F 2 4 m \u2217 and $$\\mathbb{F}_{3^{6m}}^*$$ F 3 6 m \u2217 . J. Math. Cryptol. 4(1), 1\u201342 (2010).","DOI":"10.1515\/jmc.2010.001"},{"key":"249_CR29","doi-asserted-by":"crossref","unstructured":"Karabina K.: Torus-based compression by factor 4 and 6. IEEE Trans. Inf. Theory 58(5), 3293\u20133304 (2012).","DOI":"10.1109\/TIT.2012.2184846"},{"key":"249_CR30","unstructured":"Koblitz N.: CM-curves with good cryptographic properties. In: Feigenbaum J. (ed.) Advances in Cryptology: Proceedings of CRYPTO \u201991. LNCS, vol. 576, pp. 179\u2013287. Springer, Berlin (1991)."},{"key":"249_CR31","doi-asserted-by":"crossref","unstructured":"Lang S., Weil A.: Number of points of varieties in finite fields. Am. J. Math. 76(4), 819\u2013827 (1954).","DOI":"10.2307\/2372655"},{"key":"249_CR32","unstructured":"Lange T.: Efficient arithmetic on hyperelliptic curve. Ph.D. Thesis, Univerit\u00e4t GHS Essen, Dresden, http:\/\/www.hyperelliptic.org\/tanja\/preprints.html (2001)."},{"key":"249_CR33","unstructured":"Lange T.: Trace zero subvarieties of genus 2 curves for cryptosystem. Ramanujan Math. Soc. 19(1), 15\u201333 (2004)."},{"key":"249_CR34","doi-asserted-by":"crossref","unstructured":"Lange T.: Formulae for arithmetic on genus 2 hyperelliptic curves. Appl. Algebr. Eng. Commun. Comput. 15, 295\u2013328 (2005).","DOI":"10.1007\/s00200-004-0154-8"},{"key":"249_CR35","doi-asserted-by":"crossref","unstructured":"Lenstra A.K., Verheul E.R.: The XTR public key system. In: Bellare M. (ed.) Advances in Cryptology: Proceedings of CRYPTO \u201900. LNCS, vol. 1880, pp.\u00a01\u201319. Springer, Berlin (2000).","DOI":"10.1007\/3-540-44598-6_1"},{"key":"249_CR36","doi-asserted-by":"crossref","unstructured":"Longa P., Sica F.: Four-dimensional Gallant\u2013Lambert\u2013Vanstone scalar multiplication. In: Wang X., Sako K. (eds.) Advances in Cryptology: Proceedings of ASIACRYPT \u201912. LNCS, vol. 7658, pp.\u00a0718\u2013739. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-34961-4_43"},{"key":"249_CR37","doi-asserted-by":"crossref","unstructured":"Miller V.S.: The Weil pairing, and its efficient calculation. J. Cryptol. 17(4), 235\u2013261 (2004).","DOI":"10.1007\/s00145-004-0315-8"},{"key":"249_CR38","doi-asserted-by":"crossref","unstructured":"Montgomery P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987).","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"249_CR39","unstructured":"Naumann N.: Weil-Restriktion abelscher Variet\u00e4ten. Master\u2019s thesis, Univerit\u00e4t GHS Essen, Dresden, http:\/\/web.iem.uni-due.de\/ag\/numbertheory\/dissertationen (1999)."},{"key":"249_CR40","doi-asserted-by":"crossref","unstructured":"Oliveira T., L\u00f3pez J., Aranha D.F., Rodr\u00edguez-Henr\u00edquez F.: Lambda coordinates for binary elliptic curves. In: Bertoni G., Coron J.-S. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2013. LNCS, vol. 8086, pp.\u00a0311\u2013330. Springer, Berlin (2013).","DOI":"10.1007\/978-3-642-40349-1_18"},{"key":"249_CR41","doi-asserted-by":"crossref","unstructured":"Rubin K., Silverberg A.: Supersingular abelian varieties in cryptology. In: Yung M. (ed.) Advances in Cryptology: Proceedings of CRYPTO \u201902. LNCS, vol. 2442, pp.\u00a0336\u2013353. Springer, Berlin (2002).","DOI":"10.1007\/3-540-45708-9_22"},{"key":"249_CR42","doi-asserted-by":"crossref","unstructured":"Rubin K., Silverberg A.: Torus-based cryptography. In: Boneh D. (ed.) Advances in Cryptology: Proceedings of CRYPTO \u201903. LNCS, vol. 2729, pp.\u00a0349\u2013365. Springer, Berlin (2003).","DOI":"10.1007\/978-3-540-45146-4_21"},{"key":"249_CR43","doi-asserted-by":"crossref","unstructured":"Rubin K., Silverberg A.: Using primitive subgroups to do more with fewer bits. In: Buell D. (ed.) Algorithmic Number Theory (ANTS VI) (Berlin-Heidelberg-New York). LNCS, vol. 3076, pp. 18\u201341. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-24847-7_2"},{"key":"249_CR44","doi-asserted-by":"crossref","unstructured":"Rubin K., Silverberg A.: Compression in finite fields and torus-based cryptography. SIAM J. Comput. 37(5), 1401\u20131428 (2008).","DOI":"10.1137\/060676155"},{"key":"249_CR45","doi-asserted-by":"crossref","unstructured":"Rubin K., Silverberg A.: Using abelian varieties to improve pairing-based cryptography. J. Cryptol. 22(3), 330\u2013364 (2009).","DOI":"10.1007\/s00145-008-9022-1"},{"key":"249_CR46","doi-asserted-by":"crossref","unstructured":"Shirase M., Han D., Hibino Y., Kim H., Takagi T.: A more compact representation of XTR cryptosystem. IEICE Trans. Fundam. E91-A(10), 2843\u20132850 (2008).","DOI":"10.1093\/ietfec\/e91-a.10.2843"},{"key":"249_CR47","unstructured":"Silverberg A.: Compression for trace zero subgroups of elliptic curves. Trends Math. 8, 93\u2013100 (2005)."},{"key":"249_CR48","doi-asserted-by":"crossref","unstructured":"Smith P., Skinner C.: A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In: Pieprzyk J., Safavi-Naini R. (eds.) Advances in Cryptology: Proceedings of ASIACRYPT \u201994. LNCS, vol. 917, pp.\u00a0357\u2013364. Springer, Berlin (1995).","DOI":"10.1007\/BFb0000447"},{"key":"249_CR49","unstructured":"Stahlke C.: Point compression on Jacobians of hyperelliptic curves over $${\\mathbb{F}}_{q}$$ F q , http:\/\/eprint.iacr.org\/2004\/030 (2004)."},{"key":"249_CR50","doi-asserted-by":"crossref","unstructured":"van Dijk M., Woodruff D., Asymptotically optimal communication for torus-based cryptography. In: Advances in Cryptology\u2014CRYPTO. LNCS, vol. 3152, pp. 157\u2013178. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-28628-8_10"},{"key":"249_CR51","doi-asserted-by":"crossref","unstructured":"van Dijk M., Granger R., Page D., Rubin K., Silverberg A., Stam M., Woodruff D., Practical cryptography in high dimensional tori. In: Advances in Cryptology\u2014EUROCRYPT. LNCS, vol. 3494, pp. 234\u2013250. Springer, Berlin (2005).","DOI":"10.1007\/11426639_14"},{"key":"249_CR52","doi-asserted-by":"crossref","unstructured":"Washington L.C.: Elliptic Curves: Number Theory and Cryptography, 2nd edn. Discrete Mathematics and Its Applications. Chapman & Hall\/CRC, Boca Raton (2008).","DOI":"10.1201\/9781420071474"},{"key":"249_CR53","unstructured":"Weimerskirch A.: The application of the Mordell\u2013Weil group to cryptographic systems. Master\u2019s thesis, Worcester Polytechnic Institute, Worcester, http:\/\/www.emsec.rub.de\/media\/crypto\/attachments\/files\/2010\/04\/ms_weika.pdf (2001)."},{"key":"249_CR54","doi-asserted-by":"crossref","unstructured":"Yonemura T., Isogai T., Muratani H., Hanatani Y.: Factor-4 and 6 (de)compression for values of pairings using trace maps. In: Abdalla M., Lange T. (eds.) Pairing-Based Cryptography\u2014Pairing 2012. LNCS, vol. 7708, pp.\u00a019\u201334. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-36334-4_2"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0249-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0249-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0249-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0249-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T21:40:59Z","timestamp":1568151659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0249-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,12]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["249"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0249-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,7,12]]}}}