{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:52:07Z","timestamp":1773654727886,"version":"3.50.1"},"reference-count":11,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.3103\/s0146411617080028","type":"journal-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T06:51:40Z","timestamp":1519887100000},"page":"928-935","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Elliptic curves generation for isogeny-based cryptosystems"],"prefix":"10.3103","volume":"51","author":[{"given":"E. B.","family":"Aleksandrova","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Shtyrkina","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Yarmak","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2018,3,1]]},"reference":[{"key":"6636_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The Arithmetic of Elliptic Curves","author":"J.H. Silverman","year":"1986","unstructured":"Silverman, J.H., The Arithmetic of Elliptic Curves, Springer, 1986, 2nd ed."},{"key":"6636_CR2","volume-title":"Ellipticheskie krivye v kriptografii. Teoriya i vychislitel\u2019nye algoritmy","author":"A.G. Rostovtsev","year":"2010","unstructured":"Rostovtsev, A.G., Ellipticheskie krivye v kriptografii. Teoriya i vychislitel\u2019nye algoritmy (Elliptic Curves in Cryptography. Theory and Computational Algorithms), St. Petersburg: NPO Professional, 2010."},{"key":"6636_CR3","volume-title":"Cryptology ePrint archive. Report 2011\/430","author":"D. Moody","year":"2011","unstructured":"Moody, D. and Shumov, D., Analogues of Velu\u2019s formulas for isogenies on alternate models of elliptic curves, Cryptology ePrint archive. Report 2011\/430, 2011. https:\/\/eprint.iacr.org\/2011\/430.pdf."},{"issue":"1","key":"6636_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jmc-2012-0016","volume":"8","author":"A. Childs","year":"2014","unstructured":"Childs, A., Jao, D., and Soukharey, V., Constructing elliptic curve isogenies in quantum subexponential time, J. Math. Cryptol., 2014, vol. 8, no. 1, pp. 1\u201329.","journal-title":"J. Math. Cryptol."},{"key":"6636_CR5","volume-title":"Cryptology ePrint Archive. Report 2006\/145","author":"A. Rostovtsev","year":"2006","unstructured":"Rostovtsev, A. and Stolbunov, A., Public-key cryptosystem based on isogenies, Cryptology ePrint Archive. Report 2006\/145, 2006. http:\/\/eprint.iacr.org\/2006.145.pdf."},{"key":"6636_CR6","first-page":"32","volume":"4","author":"A.G. Rostovtsev","year":"2004","unstructured":"Rostovtsev, A.G. and Makhovenko, E.B., Hilbert polynomials and j-invariants of elliptic curves, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2004, no. 4, pp. 32\u201338.","journal-title":"Probl. Inf. Bezop., Komp\u2019yut. Sist."},{"issue":"220","key":"6636_CR7","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1090\/S0025-5718-97-00854-5","volume":"66","author":"N. Yui","year":"1997","unstructured":"Yui, N. and Zagier, D., On the singular values of Weber modular functions, Math. Comput., 1997, vol. 66, no. 220, pp. 1645\u20131662.","journal-title":"Math. Comput."},{"key":"6636_CR8","volume-title":"Sage Mathematics Software (Version 4.3)","author":"W.A. Stein","year":"2009","unstructured":"Stein, W.A., et al., Sage Mathematics Software (Version 4.3). The Sage Development Team, 2009. http:\/\/www.sagemath.org."},{"key":"6636_CR9","unstructured":"Konstantinou, E. and Kontogeorgis, A., Introducing Ramanujan\u2019s Class Polynomials in the Generation of Prime Order Elliptic Curves. https:\/\/arxiv.org\/pdf\/0804.1652v1.pdf."},{"key":"6636_CR10","first-page":"193","volume":"4341","author":"L. De Feo","year":"2011","unstructured":"De Feo, L., Jao, D., and Plut, J., Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies, Post-Quantum Cryptogr., 2011, vol. 4341, pp. 193\u2013210.","journal-title":"Post-Quantum Cryptogr."},{"issue":"3","key":"6636_CR11","first-page":"269","volume":"1","author":"R. Br\u00f6ker","year":"2009","unstructured":"Br\u00f6ker, R., Constructing supersingular elliptic curves, J. Comb. Number Theory, 2009, vol. 1, no. 3, pp. 269\u2013273.","journal-title":"J. Comb. Number Theory"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411617080028","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617080028.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617080028.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:14Z","timestamp":1773612014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411617080028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["6636"],"URL":"https:\/\/doi.org\/10.3103\/s0146411617080028","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]},"assertion":[{"value":"3 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2018","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}