{"id":"https://openalex.org/W2026679231","doi":"https://doi.org/10.1109/isias.2010.5604190","title":"The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields","display_name":"The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2026679231","doi":"https://doi.org/10.1109/isias.2010.5604190","mag":"2026679231"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2010.5604190","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604190","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074555473","display_name":"Lin You","orcid":"https://orcid.org/0000-0003-2049-8961"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin You","raw_affiliation_strings":["School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","School of Communication engineering, Hangzhou Dianzi University, China"],"affiliations":[{"raw_affiliation_string":"School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"School of Communication engineering, Hangzhou Dianzi University, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060188333","display_name":"Fugeng Zeng","orcid":"https://orcid.org/0000-0002-8254-097X"},"institutions":[{"id":"https://openalex.org/I80432865","display_name":"Hainan Tropical Ocean University","ror":"https://ror.org/01y5fjx51","country_code":"CN","type":"education","lineage":["https://openalex.org/I80432865"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fugeng Zeng","raw_affiliation_strings":["School of Science and Technology, Qiongzhou University, Wuzhishan, China"],"affiliations":[{"raw_affiliation_string":"School of Science and Technology, Qiongzhou University, Wuzhishan, China","institution_ids":["https://openalex.org/I80432865"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074555473"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.6937,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82091951,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2384","issue":null,"first_page":"161","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/finite-field","display_name":"Finite field","score":0.7921538352966309},{"id":"https://openalex.org/keywords/hyperelliptic-curve","display_name":"Hyperelliptic curve","score":0.7857359647750854},{"id":"https://openalex.org/keywords/hyperelliptic-curve-cryptography","display_name":"Hyperelliptic curve cryptography","score":0.7206277251243591},{"id":"https://openalex.org/keywords/isomorphism","display_name":"Isomorphism (crystallography)","score":0.6532463431358337},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.6410226225852966},{"id":"https://openalex.org/keywords/genus","display_name":"Genus","score":0.6377370357513428},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49767640233039856},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.3892837464809418},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3539123833179474},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.3230227828025818},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20497074723243713},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.19007030129432678},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.18927323818206787},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.13937494158744812},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.06700614094734192},{"id":"https://openalex.org/keywords/zoology","display_name":"Zoology","score":0.06183117628097534}],"concepts":[{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.7921538352966309},{"id":"https://openalex.org/C11074058","wikidata":"https://www.wikidata.org/wiki/Q850110","display_name":"Hyperelliptic curve","level":3,"score":0.7857359647750854},{"id":"https://openalex.org/C166780011","wikidata":"https://www.wikidata.org/wiki/Q3005926","display_name":"Hyperelliptic curve cryptography","level":5,"score":0.7206277251243591},{"id":"https://openalex.org/C203436722","wikidata":"https://www.wikidata.org/wiki/Q902950","display_name":"Isomorphism (crystallography)","level":3,"score":0.6532463431358337},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6410226225852966},{"id":"https://openalex.org/C157369684","wikidata":"https://www.wikidata.org/wiki/Q34740","display_name":"Genus","level":2,"score":0.6377370357513428},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49767640233039856},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.3892837464809418},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3539123833179474},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.3230227828025818},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20497074723243713},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.19007030129432678},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.18927323818206787},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.13937494158744812},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.06700614094734192},{"id":"https://openalex.org/C90856448","wikidata":"https://www.wikidata.org/wiki/Q431","display_name":"Zoology","level":1,"score":0.06183117628097534},{"id":"https://openalex.org/C115624301","wikidata":"https://www.wikidata.org/wiki/Q895901","display_name":"Crystal structure","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C8010536","wikidata":"https://www.wikidata.org/wiki/Q160398","display_name":"Crystallography","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2010.5604190","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604190","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W53993146","https://openalex.org/W123358586","https://openalex.org/W1494244883","https://openalex.org/W1508193711","https://openalex.org/W1576624972","https://openalex.org/W1979502634","https://openalex.org/W2003736153","https://openalex.org/W2022862710","https://openalex.org/W2036378739","https://openalex.org/W2064281699","https://openalex.org/W2066730327","https://openalex.org/W2085553550","https://openalex.org/W2128126062","https://openalex.org/W2134748888","https://openalex.org/W2153226320","https://openalex.org/W2185304677","https://openalex.org/W2912690715","https://openalex.org/W6686096215"],"related_works":["https://openalex.org/W2066391825","https://openalex.org/W2165931314","https://openalex.org/W2036498772","https://openalex.org/W2949539275","https://openalex.org/W1626850543","https://openalex.org/W2472230317","https://openalex.org/W1979502634","https://openalex.org/W2093205513","https://openalex.org/W4221147091","https://openalex.org/W2093839200"],"abstract_inverted_index":{"Hyperelliptic":[0,62],"curves":[1,23,47,76,88,111],"of":[2,27,48,73,86,89,106,109,112],"genus":[3,28,49,90,113],"\u2264":[4],"3":[5,93],"over":[6,24,77,94,115],"finite":[7,25,78,95,116],"fields":[8,26,79,96,117],"have":[9,52,97],"been":[10,31,98],"researched":[11],"and":[12],"recommended":[13],"for":[14,16,34,70,80],"cryptography":[15],"about":[17],"twenty":[18],"years.":[19],"Though":[20],"the":[21,71,104,119],"hyperelliptic":[22,46,75,110],"four":[29,50],"may":[30,51],"not":[32],"secure":[33,74],"general":[35],"cryptographic":[36],"applications,":[37],"such":[38],"as":[39],"digital":[40],"signature":[41],"systems,":[42],"but":[43],"some":[44,53],"special":[45],"privileges":[54],"when":[55],"they":[56],"are":[57],"applied":[58],"in":[59,100],"pairing-based":[60],"cryptosystems.":[61,82],"curve":[63],"classification":[64],"based":[65],"on":[66],"isomorphism":[67,84,107],"is":[68,124],"helpful":[69],"selection":[72],"practical":[81],"The":[83],"classes":[85,108],"hypereilliptic":[87],"2":[91],"or":[92],"studied":[99],"previous":[101],"works.":[102],"Here,":[103],"number":[105],"4":[114],"with":[118],"characteristics":[120],"larger":[121],"than":[122],"three":[123],"given.":[125]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
