{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T13:57:42Z","timestamp":1648562262282},"reference-count":8,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,12,1]]},"DOI":"10.1587\/transfun.2020sml0002","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T22:17:25Z","timestamp":1606774645000},"page":"1624-1628","source":"Crossref","is-referenced-by-count":0,"title":["Study of Safe Elliptic Curve Cryptography over Gaussian Integer"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Kazuki","family":"NAGANUMA","sequence":"first","affiliation":[{"name":"Kanagawa Institute of Technology"}]},{"given":"Takashi","family":"SUZUKI","sequence":"additional","affiliation":[{"name":"Kanagawa Institute of Technology"}]},{"given":"Hiroyuki","family":"TSUJI","sequence":"additional","affiliation":[{"name":"Kanagawa Institute of Technology"}]},{"given":"Tomoaki","family":"KIMURA","sequence":"additional","affiliation":[{"name":"Kanagawa Institute of Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] S. Miller, \u201cUse of elliptic curves in cryptography,\u201d Advances in Cryptology \u2014 CRYPTO&apos;85, LNCS 218, pp.417-426, 1986. 10.1007\/3-540-39799-x_31","DOI":"10.1007\/3-540-39799-X_31"},{"key":"2","unstructured":"[2] E. Mohamed and H. Elkamchouchi, \u201cElliptic curve cryptography over Gaussian integers,\u201d International Journal of Computer Science and Network Security, vol.9, no.1, pp.413-416, 2009."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] D.M. Harris and S.L. Harris, Digital Design and Computer Architecture, pp.252-253, Elsevier, 2013. 10.1016\/C2011-0-04377-6","DOI":"10.1016\/B978-0-12-394424-5.00006-9"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] V. Diekert, M. Kufleitner, G. Rosenberger, and U. Hertrampf, Discrete Algebraic Methods: Arithmetic, Cryptography, Automata and Groups, De Gruyter, 2016. 10.1515\/9783110413335","DOI":"10.1515\/9783110413335"},{"key":"5","unstructured":"[5] G.H. Hardy and E.M. Wright, An Introduction to the Theory of Numbers, 5th ed., Oxford University Press, Oxford, 1979."},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] S.D. Galbraith, \u201cRecent progress on the elliptic curve discrete logarithm problem,\u201d Des. Codes Cryptogr., vol.71, no.1, pp.51-72, 2016. 10.1007\/s10623-015-0146-7","DOI":"10.1007\/s10623-015-0146-7"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] C. Wittmann, \u201cGroup structure of elliptic cures over finite gields,\u201d J. Number Theory, vol.88, no.2, pp.335-344, 2001. 10.1006\/jnth.2000.2622","DOI":"10.1006\/jnth.2000.2622"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] K. Rabah, \u201cElliptic curve ElGamal encryption and signature schemes,\u201d Information Technology J., vol.4, no.3, pp.299-306, 2005. 10.3923\/itj.2005.299.306","DOI":"10.3923\/itj.2005.299.306"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/12\/E103.A_2020SML0002\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T05:30:40Z","timestamp":1607146240000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/12\/E103.A_2020SML0002\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,1]]},"references-count":8,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2020sml0002","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,1]]}}}