{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:30:44Z","timestamp":1729675844764,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itw.2006.1633795","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T16:26:01Z","timestamp":1148574361000},"page":"126-130","source":"Crossref","is-referenced-by-count":5,"title":["New Point Compression Algorithms for Binary Curves"],"prefix":"10.1109","author":[{"given":"J.","family":"Lopez","sequence":"first","affiliation":[]},{"given":"R.","family":"Dahab","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Elliptic curve encryption systems","year":"2000","author":"vanstone","key":"19"},{"journal-title":"Compact Representation of Elliptic Curve Points over double-struck F sign2n","year":"1998","author":"seroussi","key":"17"},{"article-title":"Compression and decompression of elliptic curve data points","year":"2001","author":"seroussi","key":"18"},{"journal-title":"Standards for Efficient Cryptography Group Elliptic Curve Cryptography Version 1 0","year":"2000","key":"15"},{"key":"16","article-title":"Elliptic curve point halving wins big","author":"schroeppel","year":"2000","journal-title":"2nd Midwest Arithmetical Geometry in Cryptography Workshop"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"journal-title":"Digital signature standard","year":"2000","key":"14"},{"key":"11","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","article-title":"Fast multiplication on elliptic curves over double-struck F sign 2 without precomputation","volume":"1717","author":"lo?pez","year":"1999","journal-title":"CHES -Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3198-2"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.43"},{"journal-title":"Public key cryptography for the financial services industry The Elliptic Curve Digital Signature Algorithm (ECDSA)","year":"1999","key":"1"},{"journal-title":"An overview of Elliptic Curve Cryptography","year":"1999","author":"lo?pez","key":"10"},{"key":"7","first-page":"333","article-title":"A point compression method for elliptic curves defined over GF(2 m)","author":"king","year":"2004","journal-title":"Proceedings from PKC 2004"},{"journal-title":"Joint Committee Draft (CD)","article-title":"Information technology-security techniques-cryptographic techniques based on elliptic curves","year":"1999","key":"6"},{"journal-title":"IEEE Standard Specifications for Public-Key Cryptography","year":"2000","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"8","first-page":"81","article-title":"Elliptic scalar multiplication using point halving","author":"knudsen","year":"1999","journal-title":"Advances in Cryptology-Asiacrypt"}],"event":{"name":"2006 IEEE Information Theory Workshop","location":"Punta del Este, Uruguay"},"container-title":["2006 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10885\/34255\/01633795.pdf?arnumber=1633795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T02:02:16Z","timestamp":1497664936000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1633795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itw.2006.1633795","relation":{},"subject":[]}}