{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T12:54:17Z","timestamp":1574427257553},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"URL":"http:\/\/www.springer.com\/tdm","start":{"date-parts":[[2010,5,4]],"date-time":"2010-05-04T00:00:00Z","timestamp":1272931200000},"delay-in-days":0,"content-version":"tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1007\/s00145-010-9065-y","type":"journal-article","created":{"date-parts":[[2010,5,3]],"date-time":"2010-05-03T14:39:37Z","timestamp":1272897577000},"page":"446-469","source":"Crossref","is-referenced-by-count":45,"title":["Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves"],"prefix":"10.1007","volume":"24","author":[{"given":"Steven D.","family":"Galbraith","sequence":"first","affiliation":[]},{"given":"Xibin","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Scott","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,5,4]]},"reference":[{"key":"9065_CR1","series-title":"LNCS","first-page":"307","volume-title":"SAC 2005","author":"A. Antipa","year":"2006","unstructured":"A. Antipa, D.R.L. Brown, R.P. Gallant, R.J. Lambert, R. Struik, S.A. Vanstone, Accelerated verification of ecdsa signatures, in SAC 2005, ed. by B. Preneel, S.E. Tavares. LNCS, vol. 3879 (Springer, Berlin, 2006), pp. 307\u2013318"},{"key":"9065_CR2","series-title":"LNCS","first-page":"148","volume-title":"CHES 2004","author":"R. Avanzi","year":"2004","unstructured":"R. Avanzi, Aspects of hyperelliptic curves over large prime fields in software implementations, in CHES 2004, ed. by M. Joye, J.-J. Quisquater. LNCS, vol. 3156 (Springer, Berlin, 2004), pp. 148\u2013162"},{"key":"9065_CR3","author":"R. Avanzi","year":"2006","unstructured":"R. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen, F. Vercauteren, Handbook of Elliptic and Hyperelliptic Curve Cryptography (Chapman and Hall\/CRC, London, Boca Raton, 2006)","volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography"},{"key":"9065_CR4","series-title":"LNCS","first-page":"207","volume-title":"PKC 2006","author":"D.J. Bernstein","year":"2006","unstructured":"D.J. Bernstein, Curve25519: new Diffie\u2013Hellman speed records, in PKC 2006, ed. by M. Yung et al. LNCS, vol. 3958 (Springer, Berlin, 2006), pp. 207\u2013228"},{"key":"9065_CR5","unstructured":"D.J. Bernstein, Differential addition chains, preprint (2006). http:\/\/cr.yp.to\/papers.html#diffchain"},{"key":"9065_CR6","unstructured":"D.J. Bernstein, Elliptic vs. hyperelliptic, part 1 ECC 2006, Toronto, Canada. http:\/\/www.cacr.math.uwaterloo.ca\/conferences\/2006\/ecc2006\/slides.html"},{"key":"9065_CR7","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-540-76900-2_3","volume-title":"Asiacrypt 2007","author":"D.J. Bernstein","year":"2007","unstructured":"D.J. Bernstein, T. Lange, Faster addition and doubling on elliptic curves, in Asiacrypt 2007, ed. by K.\u00a0Kurosawa. LNCS, vol. 4833 (Springer, Berlin, 2007), pp. 29\u201350"},{"key":"9065_CR8","series-title":"LNCS","first-page":"20","volume-title":"AAECC 2007","author":"D.J. Bernstein","year":"2007","unstructured":"D.J. Bernstein, T. Lange, Inverted Edwards coordinates, in AAECC 2007, ed. by S. Boztas, H.-F. Lu. LNCS, vol. 4851 (Springer, Berlin, 2007), pp. 20\u201327"},{"key":"9065_CR9","series-title":"Contemporary Mathematics","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1090\/conm\/461\/08979","volume-title":"Finite Fields and Applications: Proceedings of Fq8","author":"D.J. Bernstein","year":"2008","unstructured":"D.J. Bernstein, T. Lange, Analysis and optimization of elliptic-curve single-scalar multiplication, in Finite Fields and Applications: Proceedings of Fq8. Contemporary Mathematics, vol. 461 (Am. Math. Soc., Providence, 2008), pp. 1\u201318"},{"key":"9065_CR10","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Africacrypt 2008","author":"D.J. Bernstein","year":"2008","unstructured":"D.J. Bernstein, P. Birkner, M. Joye, T. Lange, C. Peters, Twisted Edwards curves, in Africacrypt 2008, ed. by S. Vaudenay. LNCS, vol. 5023 (Springer, Berlin, 2008), pp. 389\u2013405"},{"key":"9065_CR11","year":"1999","unstructured":"I. Blake, G. Seroussi, N.P. Smart (eds.), Elliptic Curves in Cryptography (Cambridge University Press, Cambridge, 1999)","volume-title":"Elliptic Curves in Cryptography"},{"key":"9065_CR12","unstructured":"eBATS: ECRYPT benchmarking of asymmetric systems, http:\/\/www.ecrypt.eu.org\/ebats\/"},{"key":"9065_CR13","unstructured":"D.J. Bernstein, T. Lange (eds.), eBACS: ECRYPT benchmarking of cryptographic systems, http:\/\/bench.cr.yp.to\/ , accessed 9 January 2009"},{"key":"9065_CR14","unstructured":"D.R.L. Brown, Multi-dimensional Montgomery ladders for elliptic curves, eprint 2006\/220. http:\/\/www.eprint.iacr.org\/2006\/220"},{"key":"9065_CR15","series-title":"LNCS","first-page":"245","volume-title":"ACISP 2007","author":"E. Dahmen","year":"2007","unstructured":"E. Dahmen, K. Okeya, D. Schepers, Affine precomputation with sole inversion in elliptic curve cryptography, in ACISP 2007, ed. by J. Pieprzyk, H. Ghodosi, E. Dawson. LNCS, vol. 4586 (Springer, Berlin, 2007), pp. 245\u2013258"},{"key":"9065_CR16","series-title":"LNCS","first-page":"103","volume-title":"ASIACRYPT 1999","author":"I.M. Duursma","year":"1999","unstructured":"I.M. Duursma, P. Gaudry, F. Morain, Speeding up the discrete log computation on curves with automorphisms, in ASIACRYPT 1999, ed. by K.-Y. Lam, E. Okamoto, C. Xing. LNCS, vol. 1716 (Springer, Berlin, 1999), pp. 103\u2013121"},{"key":"9065_CR17","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"H.M. Edwards","year":"2007","unstructured":"H.M. Edwards, A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393\u2013422 (2007)","journal-title":"Bull. Am. Math. Soc."},{"key":"9065_CR18","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-540-85538-5_15","volume-title":"Pairing 2008","author":"S.D. Galbraith","year":"2008","unstructured":"S.D. Galbraith, M. Scott, Exponentiation in pairing-friendly groups using homomorphisms, in Pairing 2008, ed. by S.D. Galbraith, K.G. Paterson. LNCS, vol. 5209 (Springer, Berlin, 2008), pp. 211\u2013224"},{"key":"9065_CR19","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1007\/978-3-642-01001-9_30","volume-title":"EUROCRYPT 2009","author":"S.D. Galbraith","year":"2009","unstructured":"S.D. Galbraith, X. Lin, M. Scott, Endomorphisms for faster elliptic curve cryptography on a large class of curves, in EUROCRYPT 2009, ed. by A. Joux. LNCS, vol. 5479 (Springer, Berlin, 2009), pp. 518\u2013535"},{"key":"9065_CR20","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1090\/S0025-5718-99-01119-9","volume":"69","author":"R.P. Gallant","year":"2000","unstructured":"R.P. Gallant, R.J. Lambert, S.A. Vanstone, Improving the parallelized Pollard lambda search on anomalous binary curves. Math. Comput. 69, 1699\u20131705 (2000)","journal-title":"Math. Comput."},{"key":"9065_CR21","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"CRYPTO 2001","author":"R.P. Gallant","year":"2001","unstructured":"R.P. Gallant, R.J. Lambert, S.A. Vanstone, Faster point multiplication on elliptic curves with efficient endomorphisms, in CRYPTO 2001, ed. by J. Kilian. LNCS, vol. 2139 (Springer, Berlin, 2001), pp. 190\u2013200"},{"issue":"12","key":"9065_CR22","doi-asserted-by":"crossref","first-page":"1690","DOI":"10.1016\/j.jsc.2008.08.005","volume":"44","author":"P. Gaudry","year":"2009","unstructured":"P. Gaudry, Index calculus for Abelian varieties of small dimension and the elliptic curve discrete logarithm problem. J. Symb. Comput. 44(12), 1690\u20131702 (2009)","journal-title":"J. Symb. Comput."},{"key":"9065_CR23","unstructured":"P. Gaudry, E. Thom\u00e9, The mpFq library and implementing curve-based key exchanges, SPEED workshop presentation, Amsterdam, June 2007. www.hyperelliptic.org\/SPEED\/record.pdf"},{"issue":"257","key":"9065_CR24","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1090\/S0025-5718-06-01900-4","volume":"76","author":"P. Gaudry","year":"2007","unstructured":"P. Gaudry, E. Thom\u00e9, N. Th\u00e9riault, C. Diem, A double large prime variation for small genus hyperelliptic index calculus. Math. Comput. 76(257), 475\u2013492 (2007)","journal-title":"Math. Comput."},{"key":"9065_CR25","unstructured":"P. Gaudry, E. Schost, Hyperelliptic curve point counting record: 254 bit Jacobian, post to NMBRTHRY list, 22 Jun 2008. http:\/\/www.loria.fr\/gaudry\/record127\/"},{"key":"9065_CR26","unstructured":"R. Granger, On the static Diffie\u2013Hellman problem on elliptic curves over extension fields, eprint 2010\/177","DOI":"10.1007\/978-3-642-17373-8_17","doi-asserted-by":"crossref"},{"key":"9065_CR27","author":"D. Hankerson","year":"2004","unstructured":"D. Hankerson, A.J. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography (Springer, Berlin, 2004)","volume-title":"Guide to Elliptic Curve Cryptography"},{"issue":"10","key":"9065_CR28","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TC.2009.61","volume":"58","author":"D. Hankerson","year":"2009","unstructured":"D. Hankerson, K. Karabina, A.J. Menezes, Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields. IEEE Trans. Comput. 58(10), 1411\u20131420 (2009)","journal-title":"IEEE Trans. Comput."},{"issue":"10","key":"9065_CR29","doi-asserted-by":"crossref","first-page":"4595","DOI":"10.1109\/TIT.2006.881709","volume":"52","author":"F. Hess","year":"2006","unstructured":"F. Hess, N. Smart, F. Vercauteren, The eta-pairing revisited. IEEE Trans. Inf. Theory 52(10), 4595\u20134602 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9065_CR30","unstructured":"T. Iijima, K. Matsuo, J. Chao, S. Tsujii, Construction of Frobenius maps of twist elliptic curves and its application to elliptic scalar multiplication, in SCIS 2002, IEICE Japan, January 2002, pp. 699\u2013702"},{"key":"9065_CR31","series-title":"LNCS","first-page":"13","volume-title":"SAC 2002","author":"D. Kim","year":"2003","unstructured":"D. Kim, S. Lim, Integer decomposition for fast scalar multiplication on elliptic curves, in SAC 2002, ed. by K. Nyberg, H. Heys. LNCS, vol. 2595 (Springer, Berlin, 2003), pp. 13\u201320"},{"issue":"7","key":"9065_CR32","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1093\/ietfec\/e91-a.7.1839","volume":"E91-A","author":"S. Kozaki","year":"2008","unstructured":"S. Kozaki, K. Matsuo, Y. Shimbara, Skew-Frobenius maps on hyperelliptic curves. IEICE Trans. E91-A(7), 1839\u20131843 (2008)","journal-title":"IEICE Trans."},{"key":"9065_CR33","series-title":"LNCS","first-page":"229","volume-title":"PKC 2008","author":"P. Longa","year":"2008","unstructured":"P. Longa, A. Miri, New composite operations and precomputation scheme for elliptic curve cryptosystems over prime fields, in PKC 2008, ed. by R. Cramer. LNCS, vol. 4939 (Springer, Berlin, 2008), pp. 229\u2013247"},{"key":"9065_CR34","series-title":"LNCS","first-page":"165","volume-title":"SAC 2001","author":"B. M\u00f6ller","year":"2001","unstructured":"B. M\u00f6ller, Algorithms for multi-exponentiation, in SAC 2001, ed. by S. Vaudenay, A.M. Youssef. LNCS, vol. 2259 (Springer, Berlin, 2001), pp. 165\u2013180"},{"key":"9065_CR35","series-title":"LNCS","first-page":"298","volume-title":"ICISC 2002","author":"B. M\u00f6ller","year":"2003","unstructured":"B. M\u00f6ller, Improved techniques for fast exponentiation, in ICISC 2002, ed. by P. Lee, C. Lim. LNCS, vol. 2587 (Springer, Berlin, 2003), pp. 298\u2013312"},{"key":"9065_CR36","series-title":"LNCS","first-page":"137","volume-title":"ICISC 2004","author":"B. M\u00f6ller","year":"2005","unstructured":"B. M\u00f6ller, Fractional windows revisited: improved signed-digit representations for efficient exponentiation, in ICISC 2004, ed. by C. Park, S. Chee. LNCS, vol. 3506 (Springer, Berlin, 2005), pp. 137\u2013153"},{"key":"9065_CR37","series-title":"LNCS","first-page":"39","volume-title":"SCN 2008","author":"B. M\u00f6ller","year":"2008","unstructured":"B. M\u00f6ller, A. Rupp, Faster multi-exponentiation through caching: accelerating (EC)DSA signature verification, in SCN 2008, ed. by R. Ostrovsky, R. De Prisco, I. Visconti. LNCS, vol. 5229 (Springer, Berlin, 2008), pp. 39\u201356"},{"key":"9065_CR38","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"47","author":"P.L. Montgomery","year":"1987","unstructured":"P.L. Montgomery, Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 47, 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"9065_CR39","unstructured":"Y. Nogami, Y. Morikawa, Fast generation of elliptic curves with prime order over extension field of even extension degree, in Proceedings 2003 IEEE International Symposium on Information Theory (2003), p. 18"},{"key":"9065_CR40","unstructured":"Y. Nogami, Y. Morikawa, Fast generation of elliptic curves with prime order over ${\\mathbb{F}}_{p^{2^{c}}}$ . Workshop on Coding and Cryptography (WCC2003) (2003), pp. 347\u2013356"},{"key":"9065_CR41","series-title":"LNCS","first-page":"323","volume-title":"PKC 2002","author":"Y.-H. Park","year":"2002","unstructured":"Y.-H. Park, S. Jeong, C.H. Kim, J. Lim, An alternate decomposition of an integer for faster point multiplication on certain elliptic curves, in PKC 2002, ed. by D. Naccache, P. Paillier. LNCS, vol. 2274 (Springer, Berlin, 2002), pp. 323\u2013334"},{"key":"9065_CR42","series-title":"LNCS","first-page":"328","volume-title":"MMM-ACNS 2003","author":"A.G. Rostovtsev","year":"2003","unstructured":"A.G. Rostovtsev, E.B. Markovenko, Elliptic curve point multiplication, in MMM-ACNS 2003, ed. by V.\u00a0Gorodetsky. LNCS, vol. 2776 (Springer, Berlin, 2003), pp. 328\u2013336"},{"issue":"1","key":"9065_CR43","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TC.2006.3","volume":"55","author":"K. Schmidt-Samoa","year":"2006","unstructured":"K. Schmidt-Samoa, O. Semay, T. Takagi, analysis of fractional window recoding methods and their application to elliptic curve cryptosystems. IEEE Trans. Comput. 55(1), 48\u201357 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"9065_CR44","unstructured":"M. Scott, MIRACL\u2014multiprecision integer and rational arithmetic C\/C++ library, http:\/\/ftp.computing.dcu.ie\/pub\/crypto\/miracl.zip (2008)"},{"key":"9065_CR45","unstructured":"M. Scott, P. Szczechowiak, Optimizing multiprecision multiplication for public key cryptography, eprint 2007\/299. http:\/\/eprint.iacr.org\/2007\/299"},{"key":"9065_CR46","series-title":"LNCS","first-page":"21","volume-title":"SAC 2002","author":"F. Sica","year":"2003","unstructured":"F. Sica, M. Ciet, J.-J. Quisquater, Analysis of the Gallant\u2013Lambert\u2013Vanstone method based on efficient endomorphisms: elliptic and hyperelliptic curves, in SAC 2002, ed. by K. Nyberg, H.M. Heys. LNCS, vol. 2595 (Springer, Berlin, 2003), pp. 21\u201336"},{"key":"9065_CR47","author":"J.H. Silverman","year":"1986","unstructured":"J.H. Silverman, The Arithmetic of Elliptic Curves. Graduate Texts in Mathematics, vol. 106 (Springer, Berlin, 1986)","series-title":"Graduate Texts in Mathematics","volume-title":"The Arithmetic of Elliptic Curves","DOI":"10.1007\/978-1-4757-1920-8","doi-asserted-by":"crossref"},{"issue":"2\u20133","key":"9065_CR48","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"J.A. Solinas","year":"2000","unstructured":"J.A. Solinas, Efficient arithmetic on Koblitz curves. Designs Codes and Cryptogr. 19(2\u20133), 195\u2013249 (2000)","journal-title":"Designs Codes and Cryptogr."},{"key":"9065_CR49","unstructured":"J.A. Solinas, Low-weight binary representations for pairs of integers. Technical Report CORR 2001\u201341, CACR (2001)"},{"key":"9065_CR50","series-title":"LNCS","first-page":"190","volume-title":"SAC 1998","author":"M.J. Wiener","year":"1999","unstructured":"M.J. Wiener, R.J. Zuccherato, Faster attacks on elliptic curve cryptosystems, in SAC 1998, ed. by S.\u00a0Tavares, H. Meijer. LNCS, vol. 1556 (Springer, Berlin, 1999), pp. 190\u2013200"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-010-9065-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9065-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-010-9065-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T22:50:13Z","timestamp":1559083813000},"score":1.0,"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,4]]},"references-count":50,"journal-issue":{"published-print":{"date-parts":[[2011,7]]},"issue":"3"},"alternative-id":["9065"],"URL":"http:\/\/dx.doi.org\/10.1007\/s00145-010-9065-y","relation":{"cites":[]},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}]}}