{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T12:46:51Z","timestamp":1749473211735,"version":"3.41.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,7,25]],"date-time":"2016-07-25T00:00:00Z","timestamp":1469404800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10623-016-0251-2","type":"journal-article","created":{"date-parts":[[2016,7,25]],"date-time":"2016-07-25T13:12:23Z","timestamp":1469452343000},"page":"565-588","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Multiple point compression on elliptic curves"],"prefix":"10.1007","volume":"83","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[]},{"given":"Adilet","family":"Otemissov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6027-2548","authenticated-orcid":false,"given":"Francesco","family":"Sica","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Sidorenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,25]]},"reference":[{"key":"251_CR1","doi-asserted-by":"crossref","unstructured":"Adj G., Rodr\u00edguez-Henr\u00edquez F.: Square root computation over even extension fields. IEEE Trans. Comput. 63(11), 2829\u20132841 (2014).","DOI":"10.1109\/TC.2013.145"},{"key":"251_CR2","unstructured":"Ahmadi O., Hankerson D., Menezes A.: Software implementation of arithmetic in $${\\mathbb{F}}_{3^m}$$ F 3 m . In: Carlet C., Sunar B. (eds.) Proceedings of WAIFI 2007. Lecture Notes in Computer Science, vol. 4876, pp. 85\u2013102. Springer, Berlin (2007)."},{"key":"251_CR3","unstructured":"ANSI X9.62 Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) (2005)."},{"key":"251_CR4","unstructured":"ANSI X9.63. Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography (2001)."},{"key":"251_CR5","unstructured":"Avanzi R.M., Cohen H., Doche D., Frey G., Lange T., Nguyen K., Vercauteren F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall\/CRC, Boca Raton (2006)."},{"key":"251_CR6","unstructured":"Avanzi R.M.: Another look at square roots (and other less common operations) in fields of even characteristic. In: Adams C., Miri A., Wiener M. (eds.) Proceedings of SAC 2007. Lecture Notes in Computer Science, vol. 4876, pp. 138\u2013154. Springer, Berlin (2007)."},{"key":"251_CR7","unstructured":"Barretol P.S.L.M., Kim H.Y., Lynn B., Scott M.: Efficient algorithms for pairing-based cryptosystems. In: Yung M. (ed.) Proceedings of CRYPTO 2002. Lecture Notes in Computer Science, vol. 2442, pp. 354\u2013369. Springer, Berlin (2002)."},{"key":"251_CR8","doi-asserted-by":"crossref","unstructured":"Bellare M., Namprempre C., Neven G.: Security proofs for identity-based identification and signature schemes. In: Cachin C., Camenisch J. (eds.) Proceedings of EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 268\u2013286. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-24676-3_17"},{"key":"251_CR9","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., Moeller, B.: Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS). IETF Internet Draft, May 2006. http:\/\/tools.ietf.org\/html\/rfc4492 .","DOI":"10.17487\/rfc4492"},{"key":"251_CR10","unstructured":"Campagna, M., Zaverucha, G.: A cryptographic suite for embedded systems (suite E). IETF Internet Draft, October 2012. http:\/\/tools.ietf.org\/html\/draft-campagna-suitee-04 ."},{"key":"251_CR11","unstructured":"Cohen H.: A Course in Computational Algebraic Number Theory, vol. 138. Graduate Texts in Mathematics. Springer, Berlin (1996)."},{"key":"251_CR12","doi-asserted-by":"crossref","unstructured":"Cox D.A., Little J., O\u2019Shea D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra. Springer, Secaucus (2007).","DOI":"10.1007\/978-0-387-35651-8"},{"key":"251_CR13","doi-asserted-by":"crossref","unstructured":"Cox D.A., Little J., O\u2019Shea D.: Using Algebraic Geometry. Springer, Secaucus (1998).","DOI":"10.1007\/978-1-4757-6911-1"},{"key":"251_CR14","doi-asserted-by":"crossref","unstructured":"Devegili A.J., Scott M., Dahab R.: Implementing cryptographic pairings over Barreto-Naehrig curves. In: Takagi T., Okamoto E., Okamoto T., Okamoto T. (eds.) Proceedings of Pairing 2007. Lecture Notes in Computer Science, vol. 4575, pp. 197\u2013207. Springer, Berlin (2007).","DOI":"10.1007\/978-3-540-73489-5_10"},{"key":"251_CR15","doi-asserted-by":"crossref","unstructured":"Fan X., Gong G.: Accelerating signature-based broadcast authentication for wireless sensor networks. Ad Hoc Netw. 10(4), 723\u2013736 (2012).","DOI":"10.1016\/j.adhoc.2011.06.015"},{"key":"251_CR16","unstructured":"Fulton W.: Intersection Theory. Ergebnisse der Mathematik und ihrer Grenzgebiete. Springer, Berlin (1984)."},{"key":"251_CR17","doi-asserted-by":"crossref","unstructured":"Galindo D., Garcia F.D.: A Schnorr-like lightweight identity-based signature scheme. In: Preneel B. (ed.) Proceedings of AFRICACRYPT 2009. Lecture Notes in Computer Science, vol. 5580, pp. 135\u2013148. Springer, Berlin (2009).","DOI":"10.1007\/978-3-642-02384-2_9"},{"key":"251_CR18","unstructured":"Hankerson D., Menezes A., Vanstone S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2003)."},{"key":"251_CR19","unstructured":"IEEE Vehicular\u00a0Technology Society. IEEE standard for wireless access in vehicular environments security services for applications and management messages (2013)."},{"key":"251_CR20","doi-asserted-by":"crossref","unstructured":"Khabbazian M., Gulliver T.A., Bhargava V.K.: Double point compression with applications to speeding up random point multiplication. IEEE Trans. Comput. 56(3), 305\u2013313 (2007).","DOI":"10.1109\/TC.2007.47"},{"key":"251_CR21","doi-asserted-by":"crossref","unstructured":"Koblitz N.: Elliptic curve cryptosystems. J. Math. Comput. 48, 203\u2013209 (1987).","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"251_CR22","unstructured":"Koo N., Cho G.H., Kwon S.: Square root algorithm in $$\\mathbb{F} _q$$ F q for $$q \\equiv 2^s + 1 ~(\\text{mod} \\; 2^{s+1})$$ q \u2261 2 s + 1 ( mod 2 s + 1 ) . https:\/\/eprint.iacr.org\/2013\/087.pdf ."},{"key":"251_CR23","unstructured":"Lange T.: Explicit formulas database. http:\/\/hyperelliptic.org ."},{"key":"251_CR24","doi-asserted-by":"crossref","unstructured":"Liu Z., Seo H., Grosch\u00e4dl J., Kim H.: Efficient implementation of NIST-compliant elliptic curve cryptography for sensor node. In: Qing S., Zhou J., Liu D. (eds.) Proceedings of ICICS 2013. Lecture Notes in Computer Science, vol. 8233, pp. 302\u2013317. Springer, Berlin (2013).","DOI":"10.1007\/978-3-319-02726-5_22"},{"key":"251_CR25","doi-asserted-by":"crossref","unstructured":"Lou W., Ren K., Yu S., Zhang Y.: Multi-user broadcast authentication in wireless sensor networks. IEEE Trans. Veh. Technol. 58(8), 4554\u20134564 (2009).","DOI":"10.1109\/TVT.2009.2019663"},{"key":"251_CR26","unstructured":"National Highway Traffic Safety Administration. Vehicle safety communications project\u2014task 3 final report, March 2005. http:\/\/www.its.dot.gov\/research_docs\/pdf\/59vehicle-safety.pdf ."},{"key":"251_CR27","unstructured":"NIST SP 800-90. Recommendation for Random Number Generation Using Deterministic Random Bit Generators (2012)"},{"key":"251_CR28","unstructured":"NIST Removes Cryptography Algorithm from Random Number Generator Recommendations, April 2014. http:\/\/www.nist.gov\/itl\/csd\/sp800-90-042114.cfm ."},{"issue":"1","key":"251_CR29","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/JRPROC.1961.287814","volume":"49","author":"WW Peterson","year":"1961","unstructured":"Peterson W.W., Brown D.T.: Cyclic Codes for Error Detection. Proc. IRE 49(1), 228\u2013235 (1961).","journal-title":"Proc. IRE"},{"key":"251_CR30","doi-asserted-by":"crossref","unstructured":"Rouillier F.: Solving zero-dimensional systems through the rational univariate representation. Appl. Algebra Eng. Commun. Comput. 9(5), 433\u2013461 (1999).","DOI":"10.1007\/s002000050114"},{"key":"251_CR31","unstructured":"Vanstone S., Menezes A., van Oorschot P.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)."},{"key":"251_CR32","doi-asserted-by":"crossref","unstructured":"Wollinger T., Pelzl J., Paar C., Saldamli G., Ko\u00e7 \u00c7.K.: Elliptic and hyperelliptic curves on embedded $$\\mu $$ \u03bc p. ACM Trans. Embed. Comput. Syst. 3(3), 509\u2013533 (2004).","DOI":"10.1145\/1015047.1015051"},{"key":"251_CR33","doi-asserted-by":"crossref","unstructured":"Yen S.-M., Laih C.-S., Lenstra A.K.: Multi-exponentiation. Comput. Digit. Tech. 141(6), 325\u2013326 (1994).","DOI":"10.1049\/ip-cdt:19941271"},{"key":"251_CR34","doi-asserted-by":"crossref","unstructured":"Zhu S., Liu D., Ning P., Jajodia S.: Practical broadcast authentication in sensor networks. In: Proceedings of the Second Annual International Conference on Mobile and Ubiquitous System: Networking and Services (MobiQuitous 2005), pp. 118\u2013129 (2005).","DOI":"10.1109\/MOBIQUITOUS.2005.49"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0251-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0251-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0251-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0251-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:21:26Z","timestamp":1749010886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0251-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,25]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["251"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0251-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,7,25]]}}}