{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T06:55:02Z","timestamp":1649141702368},"reference-count":10,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,12,1]]},"DOI":"10.1587\/transfun.2020tal0002","type":"journal-article","created":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T22:05:30Z","timestamp":1593986730000},"page":"1403-1406","source":"Crossref","is-referenced-by-count":0,"title":["A Construction Method of an Isomorphic Map between Quadratic Extension Fields Applicable for SIDH"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Yuki","family":"NANJO","sequence":"first","affiliation":[{"name":"Okayama University"}]},{"given":"Masaaki","family":"SHIRASE","sequence":"additional","affiliation":[{"name":"Future University Hakodate"}]},{"given":"Takuya","family":"KUSAKA","sequence":"additional","affiliation":[{"name":"Okayama University"}]},{"given":"Yasuyuki","family":"NOGAMI","sequence":"additional","affiliation":[{"name":"Okayama University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] D. Jao and L. De Feo, \u201cTowards quantum-resistant cryptosystems from supersingular elliptic curve isogenies,\u201d International Workshop on Post-Quantum Cryptography, pp.19-34, Springer, 2011. 10.1007\/978-3-642-25405-5_2","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"2","unstructured":"[2] R.A. David Jao, M. Campagna, C. Costello, L.D. Feo, B. Hess, A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, J. Renes, V. Soukharev, and D. Urbanik, \u201cSupersinglar isogeny key encapsulation.\u201d Round 1 submission, NIST Post-Quantum Cryptography Standardization, 2017. https:\/\/sike.org"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] C. Costello, P. Longa, and M. Naehrig, \u201cEfficient algorithms for supersingular isogeny diffie-hellman,\u201d Annual International Cryptology Conference, pp.572-601, Springer, 2016. 10.1007\/978-3-662-53018-4_21","DOI":"10.1007\/978-3-662-53018-4_21"},{"key":"4","unstructured":"[4] M. Campagna, C. Costello, B. Hess, A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, J. Renes, D. Urbanik, et al., \u201cSupersingular isogeny key encapsulation,\u201d 2019. https:\/\/sike.org\/files\/SIDH-spec.pdf"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] Y. Nanjo, M. Shirase, T. Kusaka, and Y. Nogami, \u201cA performance analysis and evaluation of SIDH with implementation-friendly classes of quadratic extension fields,\u201d 2019 Seventh International Symposium on Computing and Networking (CANDAR), pp.178-184, IEEE, 2019. 10.1109\/candar.2019.00030","DOI":"10.1109\/CANDAR.2019.00030"},{"key":"6","unstructured":"[6] J. V\u00e9lu, \u201cIsog\u00e9nies entre courbes elliptiques,\u201d CR Acad. Sci. Paris, S\u00e9ries A, vol.273, pp.305-347, 1971."},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] D.V. Bailey and C. Paar, \u201cEfficient arithmetic in finite field extensions with application in elliptic curve cryptography,\u201d J. Cryptol., vol.14, no.3, pp.153-176, 2001. 10.1007\/s001450010012","DOI":"10.1007\/s001450010012"},{"key":"8","unstructured":"[8] Y. Nogami, A. Saito, and Y. Morikawa, \u201cFinite extension field with modulus of all-one polynomial and representation of its elements for fast arithmetic operations,\u201d IEICE Trans. Fundamentals, vol.E86-A, no.9, pp.2376-2387, Sept. 2003."},{"key":"9","unstructured":"[9] T. Kobayashi, \u201cOef using a successive extension,\u201d Proc. 2000 Symposium on Cryptography and Information Security, 2000."},{"key":"10","unstructured":"[10] F. Lemmermeyer, Reciprocity Laws: From Euler to Eisenstein, Springer Science &amp; Business Media, 2013."}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/12\/E103.A_2020TAL0002\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T05:16:41Z","timestamp":1607145401000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/12\/E103.A_2020TAL0002\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,1]]},"references-count":10,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2020tal0002","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,1]]}}}