{"id":"https://openalex.org/W1487297807","doi":"https://doi.org/10.1007/11593447_4","title":"Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains","display_name":"Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W1487297807","doi":"https://doi.org/10.1007/11593447_4","mag":"1487297807"},"language":"en","primary_location":{"id":"doi:10.1007/11593447_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11593447_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037298442","display_name":"Vassil S. Dimitrov","orcid":null},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Vassil Dimitrov","raw_affiliation_strings":["Advanced Technology Information Processing Systems laboratory, University of Calgary, Canada","Centre for Informations Security and Cryptography, University of Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"Advanced Technology Information Processing Systems laboratory, University of Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"Centre for Informations Security and Cryptography, University of Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052415408","display_name":"Laurent Imbert","orcid":"https://orcid.org/0000-0001-9362-2869"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]}],"countries":["CA","FR"],"is_corresponding":false,"raw_author_name":"Laurent Imbert","raw_affiliation_strings":["Advanced Technology Information Processing Systems laboratory, University of Calgary, Canada","Centre for Informations Security and Cryptography, University of Calgary, Canada","Laboratoire d\u2019Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier, CNRS UMR 5506, Montpellier, France"],"affiliations":[{"raw_affiliation_string":"Advanced Technology Information Processing Systems laboratory, University of Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"Centre for Informations Security and Cryptography, University of Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"Laboratoire d\u2019Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier, CNRS UMR 5506, Montpellier, France","institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I4210101743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071387793","display_name":"Pradeep Kumar Mishra","orcid":"https://orcid.org/0000-0002-5849-1346"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Pradeep Kumar Mishra","raw_affiliation_strings":["Centre for Informations Security and Cryptography, University of Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"Centre for Informations Security and Cryptography, University of Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037298442"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":8.54,"has_fulltext":false,"cited_by_count":114,"citation_normalized_percentile":{"value":0.98239622,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"59","last_page":"78"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.0026000000070780516,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10061","display_name":"Algebraic Geometry and Number Theory","score":0.0008999999845400453,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7459861040115356},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7166382670402527},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.6122634410858154},{"id":"https://openalex.org/keywords/elliptic-curve-point-multiplication","display_name":"Elliptic curve point multiplication","score":0.6024773120880127},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5994278788566589},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5888946652412415},{"id":"https://openalex.org/keywords/atomicity","display_name":"Atomicity","score":0.5554380416870117},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5352702140808105},{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.5226076245307922},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.48308923840522766},{"id":"https://openalex.org/keywords/jacobian-curve","display_name":"Jacobian curve","score":0.4294176995754242},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.36612948775291443},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3656657040119171},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33376994729042053},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21809116005897522},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1755473017692566},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.10182178020477295},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.07952684164047241}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7459861040115356},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7166382670402527},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.6122634410858154},{"id":"https://openalex.org/C117121985","wikidata":"https://www.wikidata.org/wiki/Q78380999","display_name":"Elliptic curve point multiplication","level":3,"score":0.6024773120880127},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5994278788566589},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5888946652412415},{"id":"https://openalex.org/C188045909","wikidata":"https://www.wikidata.org/wiki/Q3306359","display_name":"Atomicity","level":3,"score":0.5554380416870117},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5352702140808105},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.5226076245307922},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.48308923840522766},{"id":"https://openalex.org/C79993320","wikidata":"https://www.wikidata.org/wiki/Q6119657","display_name":"Jacobian curve","level":5,"score":0.4294176995754242},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.36612948775291443},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3656657040119171},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33376994729042053},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21809116005897522},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1755473017692566},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.10182178020477295},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.07952684164047241},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/11593447_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11593447_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W47178525","https://openalex.org/W129996525","https://openalex.org/W1508193711","https://openalex.org/W1509468219","https://openalex.org/W1529013801","https://openalex.org/W1537065876","https://openalex.org/W1539482743","https://openalex.org/W1562630396","https://openalex.org/W1563272506","https://openalex.org/W1592482282","https://openalex.org/W1603321026","https://openalex.org/W1613874182","https://openalex.org/W1860992226","https://openalex.org/W1880212920","https://openalex.org/W2003736153","https://openalex.org/W2036378739","https://openalex.org/W2042037294","https://openalex.org/W2047683864","https://openalex.org/W2066709282","https://openalex.org/W2070355633","https://openalex.org/W2113237612","https://openalex.org/W2115840814","https://openalex.org/W2121371977","https://openalex.org/W2125272473","https://openalex.org/W2137567577","https://openalex.org/W2151279347","https://openalex.org/W2154909745","https://openalex.org/W2573545511","https://openalex.org/W4255199623"],"related_works":["https://openalex.org/W3184353839","https://openalex.org/W2392460858","https://openalex.org/W3153552368","https://openalex.org/W2132341963","https://openalex.org/W2947864046","https://openalex.org/W2188057592","https://openalex.org/W2584223401","https://openalex.org/W2070245645","https://openalex.org/W2377656850","https://openalex.org/W3011918306"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":13},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
