{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T04:02:02Z","timestamp":1745294522208,"version":"3.40.4"},"reference-count":65,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.3934\/amc.2025008","type":"journal-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T09:27:56Z","timestamp":1739870876000},"page":"1539-1559","source":"Crossref","is-referenced-by-count":0,"title":["Point (de)compression for elliptic curves over highly &lt;inline-formula&gt;&lt;tex-math id=\"M1\"&gt;$ 2 $&lt;\/tex-math&gt;&lt;\/inline-formula&gt;-adic finite fields"],"prefix":"10.3934","volume":"19","author":[{"given":"Dmitrii","family":"Koshelev","sequence":"first","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2025008-1","unstructured":"<p>MNT4-753, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/coinlist.co\/build\/coda\/pages\/mnt4753\">https:\/\/coinlist.co\/build\/coda\/pages\/mnt4753<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-2","unstructured":"<p>MNT6-753, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/coinlist.co\/build\/coda\/pages\/mnt6753\">https:\/\/coinlist.co\/build\/coda\/pages\/mnt6753<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-3","unstructured":"<p>Pseudorandom number generator, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/en.wikipedia.org\/wiki\/pseudorandom_number_generator\">https:\/\/en.wikipedia.org\/wiki\/pseudorandom_number_generator<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-4","unstructured":"<p>Random number generator attack, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/en.wikipedia.org\/wiki\/random_number_generator_attack\">https:\/\/en.wikipedia.org\/wiki\/random_number_generator_attack<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-5","unstructured":"<p>STARK curve, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/docs.starkware.co\/starkex\/crypto\/stark-curve.html\">https:\/\/docs.starkware.co\/starkex\/crypto\/stark-curve.html<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-6","unstructured":"<p>Starkjub, 2023, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/github.com\/hashcloak\/starkjub\">https:\/\/github.com\/hashcloak\/starkjub<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-7","doi-asserted-by":"publisher","DOI":"10.1112\/plms\/s3-41.3.481"},{"key":"key-10.3934\/amc.2025008-8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-022-01135-y"},{"key":"key-10.3934\/amc.2025008-9","doi-asserted-by":"crossref","unstructured":"<p>D. F. Aranha, B. Salling Hvass, B. Spitters and M. Tibouchi, Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing, in <i>CCS 2023: ACM SIGSAC Conference on Computer and Communications Security<\/i>, Association for Computing Machinery, New York, (2023), 3228-3238.<\/p>","DOI":"10.1145\/3576915.3616597"},{"key":"key-10.3934\/amc.2025008-10","doi-asserted-by":"crossref","unstructured":"<p>Y. Aubry and M. Perret, A Weil theorem for singular curves, in <i>Arithmetic, Geometry, and Coding Theory<\/i> (eds. R. Pellikaan, M. Perret and S. G. Vl\u0103du\u0163), Proceedings in Mathematics, De Gruyter, Berlin, (1996), 1-7.<\/p>","DOI":"10.1515\/9783110811056.1"},{"key":"key-10.3934\/amc.2025008-11","unstructured":"<p>E. Barker and J. Kelsey, Recommendation for random number generation using deterministic random bit generators (NIST Special Publication 800-90A Revision 1), 2015. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-90a\/rev-1\/final\">https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-90a\/rev-1\/final<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-12","doi-asserted-by":"crossref","unstructured":"<p>M. Bell\u00e9s-Mu\u00f1oz, J. Jim\u00e9nez Urroz and J. Silva, Revisiting cycles of pairing-friendly elliptic curves, in <i>Advances in Cryptology \u2013 CRYPTO 2023<\/i> (eds. H. Handschuh and A. Lysyanskaya), vol. <b>14082<\/b> of Lecture Notes in Computer Science, Springer, Cham, (2023), 3-37.<\/p>","DOI":"10.1007\/978-3-031-38545-2_1"},{"key":"key-10.3934\/amc.2025008-13","doi-asserted-by":"publisher","DOI":"10.3390\/math9233022"},{"key":"key-10.3934\/amc.2025008-14","doi-asserted-by":"crossref","unstructured":"<p>E. Ben-Sasson, A. Chiesa, E. Tromer and M. Virza, Scalable zero knowledge via cycles of elliptic curves, in <i>Advances in Cryptology\u2013CRYPTO 2014<\/i> (eds. J. A. Garay and R. Gennaro), vol. <b>8617<\/b> of Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, (2014), 276-294.<\/p>","DOI":"10.1007\/978-3-662-44381-1_16"},{"key":"key-10.3934\/amc.2025008-15","unstructured":"<p>D. J. Bernstein, Faster square roots in annoying finite fields, 2001. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/cr.yp.to\/papers.html#sqroot\">https:\/\/cr.yp.to\/papers.html#sqroot<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-16","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.340-398"},{"key":"key-10.3934\/amc.2025008-17","doi-asserted-by":"crossref","unstructured":"<p>O. Billet and M. Joye, The Jacobi model of an elliptic curve and side-channel analysis, in <i>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. AAECC 2003<\/i> (eds. M. Fossorier, T. H\u00f8holdt and A. Poli), vol. <b>2643<\/b> of Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2003, 34-42.<\/p>","DOI":"10.1007\/3-540-44828-4_5"},{"key":"key-10.3934\/amc.2025008-18"},{"key":"key-10.3934\/amc.2025008-19","unstructured":"<p>L. Chen, D. Moody, A. Regenscheid, A. Robinson and K. Randall, Recommendations for discrete logarithm-based cryptography: Elliptic curve domain parameters (NIST Special Publication 800-186), 2023. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-186\/final\">https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-186\/final<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2020.101708"},{"key":"key-10.3934\/amc.2025008-21"},{"key":"key-10.3934\/amc.2025008-22","doi-asserted-by":"publisher","DOI":"10.1080\/00029890.2005.11920264"},{"key":"key-10.3934\/amc.2025008-23","doi-asserted-by":"crossref","unstructured":"<p>N. El Mrabet and M. Joye (eds.), <i>Guide to Pairing-Based Cryptography<\/i>, Cryptography and Network Security Series, Chapman and Hall\/CRC, New York, 2017.<\/p>","DOI":"10.1201\/9781315370170"},{"key":"key-10.3934\/amc.2025008-24","unstructured":"<p>Electric Coin Company, What is Jubjub?. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/bitzecbzc.github.io\/technology\/jubjub\">https:\/\/bitzecbzc.github.io\/technology\/jubjub<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-25","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0251-2"},{"key":"key-10.3934\/amc.2025008-26","doi-asserted-by":"crossref","unstructured":"<p>P. A. Fouque, R. Lercier, D. R\u00e9al and F. Valette, Fault attack on elliptic curve Montgomery ladder implementation, in <i>2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography<\/i>, Institute of Electrical and Electronics Engineers, New York, 2008, 92-98.<\/p>","DOI":"10.1109\/FDTC.2008.15"},{"key":"key-10.3934\/amc.2025008-27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139012843"},{"key":"key-10.3934\/amc.2025008-28","unstructured":"<p>M. J. Handley and E. Rescorla, Internet denial-of-service considerations (RFC 4732), Internet Architecture Board, 2006. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/datatracker.ietf.org\/doc\/rfc4732\">https:\/\/datatracker.ietf.org\/doc\/rfc4732<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-29","doi-asserted-by":"crossref","unstructured":"<p>R. Hartshorne, <i>Algebraic Geometry<\/i>, vol. 52 of Graduate Texts in Mathematics, 8th edition, Springer, New York, 1977.<\/p>","DOI":"10.1007\/978-1-4757-3849-0"},{"key":"key-10.3934\/amc.2025008-30","unstructured":"<p>D. Hopwood, The Pasta curves for Halo $2$ and beyond, 2020. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/electriccoin.co\/blog\/the-pasta-curves-for-halo-2-and-beyond\">https:\/\/electriccoin.co\/blog\/the-pasta-curves-for-halo-2-and-beyond<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-31","unstructured":"<p>D. Hopwood, Pluto\/Eris supporting evidence, 2021. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/github.com\/daira\/pluto-eris\">https:\/\/github.com\/daira\/pluto-eris<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-32","doi-asserted-by":"crossref","unstructured":"<p>T. Icart, How to hash into elliptic curves, in <i>Advances in Cryptology\u2013CRYPTO 2009<\/i> (ed. S. Halevi), vol. <b>5677<\/b> of Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2009,303-316.<\/p>","DOI":"10.1007\/978-3-642-03356-8_18"},{"key":"key-10.3934\/amc.2025008-33","doi-asserted-by":"publisher","DOI":"10.1049\/el:19960359"},{"key":"key-10.3934\/amc.2025008-34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.47"},{"key":"key-10.3934\/amc.2025008-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2024.102517"},{"key":"key-10.3934\/amc.2025008-36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2020.101774"},{"key":"key-10.3934\/amc.2025008-37","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-022-01012-8"},{"key":"key-10.3934\/amc.2025008-38","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-023-00625-3"},{"key":"key-10.3934\/amc.2025008-39","unstructured":"<p>D. Koshelev, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/journals.flvc.org\/mathcryptology\/article\/view\/132727\">Generation of \u201cindependent\u201d points on elliptic curves by means of Mordell\u2013Weil lattices<\/ext-link>, <i>Mathematical Cryptology<\/i>, <b>4<\/b> (2024), 11-22.<\/p>"},{"key":"key-10.3934\/amc.2025008-40","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-024-09490-w"},{"key":"key-10.3934\/amc.2025008-41","unstructured":"<p>D. Koshelev, Magma code, 2024, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/github.com\/dimitri-koshelev\/point-de-compression-for-elliptic-curves-over-highly-2-adic-finite-fields\">https:\/\/github.com\/dimitri-koshelev\/point-de-compression-for-elliptic-curves-over-highly-2-adic-finite-fields<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-42","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-024-00514-4"},{"key":"key-10.3934\/amc.2025008-43","unstructured":"<p>R. J. Lambert, Method to calculate square roots for elliptic curve cryptography, 2013. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/patents.google.com\/patent\/US9148282B2\/en\">https:\/\/patents.google.com\/patent\/US9148282B2\/en<\/ext-link>, United States patent No. 9148282B2.<\/p>"},{"key":"key-10.3934\/amc.2025008-44","unstructured":"<p>D. H. Lehmer, Computer technology applied to the theory of numbers, in <i>Studies in Number Theory<\/i> (ed. W. J. LeVeque), vol. <b>6<\/b> of Studies in Mathematics, Mathematical Association of America, Washington, (1969), 117-151.<\/p>"},{"key":"key-10.3934\/amc.2025008-45","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-024-01472-0"},{"key":"key-10.3934\/amc.2025008-46","doi-asserted-by":"crossref","unstructured":"<p>V. S. Miller, Use of elliptic curves in cryptography, in <i>Advances in Cryptology\u2013CRYPTO 1985<\/i> (ed. H. C. Williams), vol. <b>218<\/b> of Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 1986,417-426.<\/p>","DOI":"10.1007\/3-540-39799-X_31"},{"key":"key-10.3934\/amc.2025008-47","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-04-01640-0"},{"key":"key-10.3934\/amc.2025008-48","unstructured":"<p>\n\nA. Miyaji, M. Nakabayashi and S. Takano, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/search.ieice.org\/bin\/summary.php?id=e84-a_5_1234\">New explicit conditions of elliptic curve traces for FR-reduction<\/ext-link>, <i>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences<\/i>, <b>E84-A<\/b> (2001), 1234-1243.<\/p>"},{"key":"key-10.3934\/amc.2025008-49","doi-asserted-by":"publisher","DOI":"10.1023\/B:DESI.0000015890.44831.e2"},{"key":"key-10.3934\/amc.2025008-50","doi-asserted-by":"crossref","unstructured":"<p>C. Petit, M. Kosters and A. Messeng, Algebraic approaches for the elliptic curve discrete logarithm problem over prime fields, in <i>Public-Key Cryptography\u2013PKC 2016<\/i> (eds. C. M. Cheng, K. M. Chung, G. Persiano and B. Y. Yang), vol. <b>9615<\/b> of Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, (2016), 3-18.<\/p>","DOI":"10.1007\/978-3-662-49387-8_1"},{"key":"key-10.3934\/amc.2025008-51","unstructured":"<p>T. Pornin, Optimized discrete logarithm computation for faster square roots in finite fields, 2023. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/eprint.iacr.org\/2023\/828\">https:\/\/eprint.iacr.org\/2023\/828<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-52","unstructured":"<p>T. Pornin, A prime-order group with complete formulas from even-order elliptic curves, <i>IACR Communications in Cryptology<\/i>, <b>1<\/b>.<\/p>"},{"key":"key-10.3934\/amc.2025008-53","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2022007"},{"key":"key-10.3934\/amc.2025008-54","doi-asserted-by":"publisher","DOI":"10.1145\/347127.347137"},{"key":"key-10.3934\/amc.2025008-55","doi-asserted-by":"crossref","unstructured":"<p>J.-P. Serre, <i>Algebraic Groups and Class Fields<\/i>, vol. 117 of Graduate Texts in Mathematics, Springer, New York, 1988.<\/p>","DOI":"10.1007\/978-1-4612-1035-1"},{"key":"key-10.3934\/amc.2025008-56","unstructured":"<p>D. Shanks, Five number-theoretic algorithms, in <i>Proceedings of the Second Manitoba Conference on Numerical Mathematics<\/i> (eds. R. S. D. Thomas and H. C. Williams), vol. <b>7<\/b> of Congressus Numerantium, Utilitas Mathematica Publishing Inc., Winnipeg, (1973), 51-70.<\/p>"},{"key":"key-10.3934\/amc.2025008-57","unstructured":"<p>V. Shoup, <i><ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/www.cambridge.org\/nz\/universitypress\/subjects\/computer-science\/algorithmics-complexity-computer-algebra-and-computational-g\/computational-introduction-number-theory-and-algebra-2nd-edition\">A Computational Introduction to Number Theory and Algebra<\/ext-link><\/i>, 2nd edition, Cambridge University Press, Cambridge, 2009.<\/p>"},{"key":"key-10.3934\/amc.2025008-58","doi-asserted-by":"crossref","unstructured":"<p>I. E. Shparlinski, Pseudorandom number generators from elliptic curves, in <i>Recent Trends in Cryptography<\/i> (ed. I. Luengo), vol. <b>477<\/b> of Contemporary Mathematics, American Mathematical Society, Providence, (2009), 121-141.<\/p>","DOI":"10.1090\/conm\/477\/09305"},{"key":"key-10.3934\/amc.2025008-59","doi-asserted-by":"publisher","DOI":"10.1080\/10586458.2011.565253"},{"key":"key-10.3934\/amc.2025008-60","doi-asserted-by":"crossref","unstructured":"<p>H. Stichtenoth, <i>Algebraic Function Fields and Codes<\/i>, vol. 254 of Graduate Texts in Mathematics, 2nd edition, Springer, Berlin, Heidelberg, 2009.<\/p>","DOI":"10.1007\/978-3-540-76878-4"},{"key":"key-10.3934\/amc.2025008-61","unstructured":"<p>R. Struik, Alternative elliptic curve representations, 2024. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-lwig-curve-representations\/23\">https:\/\/datatracker.ietf.org\/doc\/draft-ietf-lwig-curve-representations\/23<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-62","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-10-02356-2"},{"key":"key-10.3934\/amc.2025008-63","unstructured":"<p>A. Tonelli, Bemerkung \u00fcber die aufl\u00f6sung quadratischer congruenzen, <i>Nachrichten von der K\u00f6niglichen Gesellschaft der Wissenschaften und der Georg-Augusts-Universit\u00e4t zu G\u00f6ttingen<\/i>, 344-346.<\/p>"},{"key":"key-10.3934\/amc.2025008-64","unstructured":"<p>A. Vlasov, EIP-2539: BLS12-377curve operations, 2020. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-2539\">https:\/\/eips.ethereum.org\/EIPS\/eip-2539<\/ext-link>.<\/p>"},{"key":"key-10.3934\/amc.2025008-65","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539799351018"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"deposited":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T09:37:56Z","timestamp":1745228276000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2025008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":65,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2025008","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"type":"print","value":"1930-5346"},{"type":"electronic","value":"1930-5338"}],"subject":[],"published":{"date-parts":[[2025]]}}}