{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:27:25Z","timestamp":1725578845644},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642193781"},{"type":"electronic","value":"9783642193798"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19379-8_8","type":"book-chapter","created":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T12:29:44Z","timestamp":1298982584000},"page":"128-146","source":"Crossref","is-referenced-by-count":22,"title":["On the Correct Use of the Negation Map in the Pollard rho Method"],"prefix":"10.1007","author":[{"given":"Daniel J.","family":"Bernstein","sequence":"first","affiliation":[]},{"given":"Tanja","family":"Lange","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Bailey, D.V., Batina, L., Bernstein, D.J., Birkner, P., Bos, J.W., Chen, H.-C., Cheng, C.-M., Van Damme, G., de Meulenaer, G., Dominguez Perez, L.J., Fan, J., G\u00fcneysu, T., G\u00fcrkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Niederhagen, R., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L., Van Herrewege, A., Yang, B.-Y.: Breaking ECC2K-130 (2010), \n \n http:\/\/eprint.iacr.org\/2009\/541\/\n \n \n , Citations in this document: \u00a72, \u00a72","key":"8_CR1"},{"doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: PKC 2006 [24], pp. 207\u2013228 (2006), \n \n http:\/\/cr.yp.to\/papers.html#curve25519\n \n \n , Citations in this document: \u00a74","key":"8_CR2","DOI":"10.1007\/11745853_14"},{"unstructured":"Bos, J.W., Kaihara, M.E., Kleinjung, T., Lenstra, A.K., Montgomery, P.L.: PlayStation 3 computing breaks 260 barrier; 112-bit prime ECDLP solved (2009), \n \n http:\/\/lacal.epfl.ch\/112bit_prime\n \n \n , Citations in this document: \u00a71, \u00a71, \u00a74, \u00a74, \u00a75, \u00a76, \u00a76, \u00a76","key":"8_CR3"},{"unstructured":"Bos, J.W., Kaihara, M.E., Kleinjung, T., Lenstra, A.K., Montgomery, P.L.: On the security of 1024-bit RSA and 160-bit elliptic curve cryptography: version 2.1 (2009), \n \n http:\/\/eprint.iacr.org\/2009\/389\/\n \n \n , Citations in this document: \u00a71, \u00a74, \u00a75, \u00a75, \u00a75, \u00a75, \u00a75, \u00a75, \u00a76","key":"8_CR4"},{"unstructured":"Bos, J.W., Kaihara, M.E., Montgomery, P.L.: Pollard rho on the PlayStation 3. In: Workshop record of SHARCS 2009, pp. 35\u201350 (2009), \n \n http:\/\/www.hyperelliptic.org\/tanja\/SHARCS\/record2.pdf\n \n \n , Citations in this document: \u00a71, \u00a71, \u00a74, \u00a75, \u00a75, \u00a75, \u00a75, \u00a76, \u00a76, \u00a76","key":"8_CR5"},{"doi-asserted-by":"crossref","unstructured":"Bos, J.W., Kleinjung, T., Lenstra, A.K.: On the use of the negation map in the Pollard rho method. In: ANTS 2010 [11], pp. 66\u201382 (2010), Citations in this document: \u00a71,\u00a71, \u00a72, \u00a72, \u00a76","key":"8_CR6","DOI":"10.1007\/978-3-642-14518-6_9"},{"unstructured":"Certicom Research, SEC 2: Recommended elliptic curve domain parameters (2000), \n \n http:\/\/www.secg.org\/collateral\/sec2_final.pdf\n \n \n , Citations in this document: \u00a74","key":"8_CR7"},{"doi-asserted-by":"crossref","unstructured":"Costigan, N., Schwabe, P.: Fast elliptic-curve cryptography on the Cell Broadband Engine. In: AFRICACRYPT 2009 [18], pp. 368\u2013385 (2009), \n \n http:\/\/cryptojedi.org\/users\/peter\/#celldh\n \n \n , Citations in this document: \u00a74","key":"8_CR8","DOI":"10.1007\/978-3-642-02384-2_23"},{"doi-asserted-by":"crossref","unstructured":"Duursma, I.M., Gaudry, P., Morain, F.: Speeding up the discrete log computation on curves with automorphisms. In: ASIACRYPT 1999 [14], pp. 103\u2013121 (1999), Citations in this document: \u00a72, \u00a72","key":"8_CR9","DOI":"10.1007\/978-3-540-48000-6_10"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1090\/S0025-5718-99-01119-9","volume":"69","author":"R.P. Gallant","year":"2000","unstructured":"Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Improving the parallelized Pollard lambda search on anomalous binary curves. Mathematics of Computation\u00a069, 1699\u20131705 (2000), Citations in this document: \u00a72","journal-title":"Mathematics of Computation"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14518-6","volume-title":"Proceedings of Algorithmic Number Theory, 9th International Symposium, ANTS-IX","author":"G. Hanrot","year":"2010","unstructured":"Hanrot, G., Morain, F., Thom\u00e9, E. (eds.): Proceedings of Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23. LNCS, vol.\u00a06197. Springer, Heidelberg (2010), See [6]"},{"unstructured":"Harley, R.J.: Solution to Certicom\u2019s ECC2K-95 problem (email message) (1998), \n \n http:\/\/cristal.inria.fr\/~harley\/ecdl5\/ECC2K-95.submission.text\n \n \n , Citations in this document: \u00a72","key":"8_CR12"},{"unstructured":"IBM DeveloperWorks, Cell Broadband Engine Programming Handbook, Including the PowerXCell 8i Processor (version 1.11) (2008), \n \n http:\/\/www-01.ibm.com\/chips\/techlib\/techlib.nsf\/techdocs\/1741C509C5F64B3300257460006FD68D\n \n \n , Citations in this document: \u00a75","key":"8_CR13"},{"doi-asserted-by":"crossref","unstructured":"Lam, K.-Y., Okamoto, E., Xing, C. (eds.): Proceedings of Advances in Cryptology \u2013 ASIACRYPT 1999, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18. LNCS, vol. 1716. Springer, Heidelberg (1999), See [9]","key":"8_CR14","DOI":"10.1007\/b72231"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation\u00a048, 243\u2013264 (1987), http:\/\/links.jstor.org\/sici?sici=0025-5718(198701)48:177<243:STPAEC>2.0.CO;2-3, ISSN 0025\u20135718, MR 88e:11130, Citations in this document: \u00a73","journal-title":"Mathematics of Computation"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P.C. Oorschot van","year":"1999","unstructured":"van Oorschot, P.C., Wiener, M.: Parallel collision search with cryptanalytic applications. Journal of Cryptology\u00a012, 1\u201328 (1999), \n \n http:\/\/members.rogers.com\/paulv\/papers\/pubs.html\n \n \n , ISSN 0933\u20132790, Citations in this document: \u00a72","journal-title":"Journal of Cryptology"},{"key":"8_CR17","first-page":"918","volume":"32","author":"J.M. Pollard","year":"1978","unstructured":"Pollard, J.M.: Monte Carlo methods for index computation mod p. Mathematics of Computation\u00a032, 918\u2013924 (1978) ISSN 0025\u20135718, MR 58:10684, Citations in this document: \u00a72","journal-title":"Mathematics of Computation"},{"doi-asserted-by":"crossref","unstructured":"Preneel, B. (ed.): Proceedings of Progress in Cryptology \u2013 AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25. LNCS, vol. 5580. Springer, Heidelberg (2009), See [8]","key":"8_CR18","DOI":"10.1007\/978-3-642-02384-2"},{"unstructured":"Sony Corporation, Cell Broadband Engine architecture, Version 1.01 (2006), \n \n http:\/\/cell.scei.co.jp\/pdf\/CBE_Architecture_v101.pdf\n \n \n , Citations in this document: \u00a75","key":"8_CR19"},{"doi-asserted-by":"crossref","unstructured":"Tavares, S., Meijer, H. (eds.): Selected areas of cryptography 1998. LNCS, vol. 1556. Springer, Heidelberg (1999), See [23]","key":"8_CR20","DOI":"10.1007\/3-540-48892-8"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1090\/S0025-5718-00-01213-8","volume":"70","author":"E. Teske","year":"2001","unstructured":"Teske, E.: On random walks for Pollard\u2019s rho method. Mathematics of Computation\u00a070, 809\u2013825 (2001), Citations in this document: \u00a72","journal-title":"Mathematics of Computation"},{"doi-asserted-by":"crossref","unstructured":"Wiener, M.J., Zuccherato, R.J.: Faster attacks on elliptic curve cryptosystems (1998); see also newer version [23], \n \n http:\/\/grouper.ieee.org\/groups\/1363\/Research\/contributions\/attackEC.ps","key":"8_CR22","DOI":"10.1007\/3-540-48892-8_15"},{"doi-asserted-by":"crossref","unstructured":"Wiener, M.J., Zuccherato, R.J.: Faster attacks on elliptic curve cryptosystems. In: SAC 1998 [20], pp. 190\u2013200 (1998); see also older version [22], Citations in this document: \u00a72","key":"8_CR23","DOI":"10.1007\/3-540-48892-8_15"},{"doi-asserted-by":"crossref","unstructured":"Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.): Proceedings of Public Key Cryptography \u2013 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26. LNCS, vol. 3958. Springer, Heidelberg (2006), See [2]","key":"8_CR24","DOI":"10.1007\/11745853"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography \u2013 PKC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19379-8_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:46:47Z","timestamp":1606168007000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19379-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642193781","9783642193798"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19379-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}