{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T02:29:20Z","timestamp":1660271360615},"reference-count":14,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2005,3,1]],"date-time":"2005-03-01T00:00:00Z","timestamp":1109635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,18]],"date-time":"2013-07-18T00:00:00Z","timestamp":1374105600000},"content-version":"vor","delay-in-days":3061,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Discrete Algorithms"],"published-print":{"date-parts":[[2005,3]]},"DOI":"10.1016\/j.jda.2004.04.011","type":"journal-article","created":{"date-parts":[[2004,7,7]],"date-time":"2004-07-07T11:50:37Z","timestamp":1089201037000},"page":"113-124","source":"Crossref","is-referenced-by-count":9,"title":["Efficient algorithms for Koblitz curves over fields of characteristic three"],"prefix":"10.1016","volume":"3","author":[{"given":"Ian F.","family":"Blake","sequence":"first","affiliation":[]},{"given":"V.","family":"Kumar Murty","sequence":"additional","affiliation":[]},{"given":"Guangwu","family":"Xu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jda.2004.04.011_BIB001","series-title":"Advances in Cryptology (CRYPTO '02)","first-page":"354","article-title":"Efficient algorithms for pairing-based cryptosystems","volume":"vol. 2442","author":"Barreto","year":"2002"},{"key":"10.1016\/j.jda.2004.04.011_BIB002","series-title":"Elliptic Curves in Cryptography","author":"Blake","year":"1999"},{"key":"10.1016\/j.jda.2004.04.011_BIB003","series-title":"Advances in Cryptology (CRYPTO '01)","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume":"vol. 2139","author":"Boneh","year":"2001"},{"key":"10.1016\/j.jda.2004.04.011_BIB004","first-page":"865","article-title":"A remark concerning m-divisibility and the discrete logarithm in divisor class group of curves","volume":"62","author":"Frey","year":"1994","journal-title":"Math. Comput."},{"key":"10.1016\/j.jda.2004.04.011_BIB005","series-title":"Algorithm Number Theory Symposium (ANTS-V)","first-page":"324","article-title":"Implementing the Tate pairing","volume":"vol. 2369","author":"Galbraith","year":"2002"},{"key":"10.1016\/j.jda.2004.04.011_BIB006","first-page":"1907","article-title":"Fast multiplication on a family of Koblitz elliptic curves","volume":"14","author":"Hu","year":"2003","journal-title":"J. Software (Chinese)"},{"key":"10.1016\/j.jda.2004.04.011_BIB007","series-title":"Algorithm Number Theory Symposium (ANTS-IV)","first-page":"385","article-title":"A one round protocol for tripartite Diffie-Hellman","volume":"vol. 1838","author":"Joux","year":"2000"},{"key":"10.1016\/j.jda.2004.04.011_BIB008","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"10.1016\/j.jda.2004.04.011_BIB009","series-title":"Advances in Cryptology (CRYPTO '91)","first-page":"279","article-title":"CM-curves with good cryptographic properties","volume":"vol. 576","author":"Koblitz","year":"1992"},{"key":"10.1016\/j.jda.2004.04.011_BIB010","series-title":"Advances in Cryptology (CRYPTO '98)","first-page":"327","article-title":"An elliptic curves implementation of the finite field digital signature algorithm","volume":"vol. 1462","author":"Koblitz","year":"1998"},{"key":"10.1016\/j.jda.2004.04.011_BIB011","series-title":"Advances in Cryptology (CRYPTO '92)","first-page":"333","article-title":"Efficient multiplication on certain nonsupersingular elliptic curves","volume":"vol. 740","author":"Meier","year":"1992"},{"issue":"1","key":"10.1016\/j.jda.2004.04.011_BIB012","first-page":"639","article-title":"Reducing elliptic curve logarithms to logarithms in a finite field","volume":"39","author":"Menezes","year":"1993","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/j.jda.2004.04.011_BIB013","series-title":"Advances in Cryptology (CRYPTO '85)","first-page":"417","article-title":"Uses of elliptic curves in cryptography","volume":"vol. 218","author":"Miller","year":"1985"},{"key":"10.1016\/j.jda.2004.04.011_BIB014","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1023\/A:1008306223194","article-title":"Efficient arithmetic on Koblitz curves","volume":"19","author":"Solinas","year":"2000","journal-title":"Designs, Codes and Cryptography"}],"container-title":["Journal of Discrete Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570866704000401?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570866704000401?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T01:22:40Z","timestamp":1549416160000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570866704000401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,3]]}},"alternative-id":["S1570866704000401"],"URL":"https:\/\/doi.org\/10.1016\/j.jda.2004.04.011","relation":{},"ISSN":["1570-8667"],"issn-type":[{"value":"1570-8667","type":"print"}],"subject":[],"published":{"date-parts":[[2005,3]]}}}