{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:10:28Z","timestamp":1772806228172,"version":"3.50.1"},"reference-count":18,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2017]]},"DOI":"10.3934\/amc.2017034","type":"journal-article","created":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T16:14:39Z","timestamp":1494346479000},"page":"397-407","source":"Crossref","is-referenced-by-count":5,"title":["Cycle structure of iterating Redei functions"],"prefix":"10.3934","volume":"11","author":[{"given":"Claudio","family":"Qureshi","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Panario","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Carleton University, Canada"}]},{"given":"Rodrigo","family":"Martins","sequence":"additional","affiliation":[{"name":"Academic Department of Mathematics, UTFPR, Brazil"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2017034-1","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"key":"key-10.3934\/amc.2017034-2","doi-asserted-by":"publisher","DOI":"10.2307\/2007666"},{"key":"key-10.3934\/amc.2017034-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnt.2004.04.005"},{"key":"key-10.3934\/amc.2017034-4","unstructured":"<p>D. A. Cox,  <i>Primes of the Form<\/i> $x^2+ny^2$<i>: Fermat, Class Field Theory and Complex Multiplication<\/i>, Wiley-Interscience, 1989.<\/p>"},{"key":"key-10.3934\/amc.2017034-5","unstructured":"<p>FIPS PUB 186-4,  <i>Digital Signature Standard (DSS), Federal Information Processing Standards Publication<\/i>, NIST, 2013.<\/p>"},{"key":"key-10.3934\/amc.2017034-6","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(91)90282-7"},{"key":"key-10.3934\/amc.2017034-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2005.10.001"},{"key":"key-10.3934\/amc.2017034-8","unstructured":"<p>NIST Special Publication 800-56A,  <i>Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography<\/i>, NIST, 2007.<\/p>"},{"key":"key-10.3934\/amc.2017034-9"},{"key":"key-10.3934\/amc.2017034-10"},{"key":"key-10.3934\/amc.2017034-11","doi-asserted-by":"publisher","DOI":"10.1007\/BF01270400"},{"key":"key-10.3934\/amc.2017034-12"},{"key":"key-10.3934\/amc.2017034-13","doi-asserted-by":"publisher","DOI":"10.2307\/2006496"},{"key":"key-10.3934\/amc.2017034-14","doi-asserted-by":"publisher","DOI":"10.1137\/140993338"},{"key":"key-10.3934\/amc.2017034-15","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2012.6.347"},{"key":"key-10.3934\/amc.2017034-16"},{"key":"key-10.3934\/amc.2017034-17","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(03)00158-4"},{"key":"key-10.3934\/amc.2017034-18","doi-asserted-by":"crossref","unstructured":"<p>M. Wiener and R. Zuccherato, Faster attacks on elliptic curve cryptosystems, in <i>SelectedAreas in Cryptography<\/i>, 1998,190-200.<\/p>","DOI":"10.1007\/3-540-48892-8_15"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/aimsciences.org\/download\/files\/1930-5346_2017_2_397.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T09:59:46Z","timestamp":1772791186000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2017034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2017034","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}