{"updated":"2025-01-19T11:06:37.904164+00:00","links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00230530","sets":["6504:11436:11442"]},"path":["11442"],"owner":"44499","recid":"230530","title":["GLSスカラー倍算の安全性分析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-02-16"},"_buckets":{"deposit":"f1fee4f1-fd47-4e27-8829-34b4c5392d34"},"_deposit":{"id":"230530","pid":{"type":"depid","value":"230530","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"GLSスカラー倍算の安全性分析","author_link":["621236","621237","621235"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"GLSスカラー倍算の安全性分析"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"22","publish_date":"2023-02-16","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_22_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"阪大"},{"subitem_text_value":"国立台湾大"},{"subitem_text_value":"阪大"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/230530/files/IPSJ-Z85-2ZD-04.pdf","label":"IPSJ-Z85-2ZD-04.pdf"},"date":[{"dateType":"Available","dateValue":"2023-11-17"}],"format":"application/pdf","filename":"IPSJ-Z85-2ZD-04.pdf","filesize":[{"value":"147.7 kB"}],"mimetype":"application/pdf","accessrole":"open_date","version_id":"12cc7575-e969-4554-aa57-e57fe73dbe6a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_22_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高, 月"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"呉, 書帆"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮地, 充子"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_22_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00349328","subitem_source_identifier_type":"NCID"}]},"item_22_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Since elliptic curve was came up in 1985 by Miller and Koblitz, elliptic curve cryptography has been become one of the most important croptography algorithms in decades. The efficiency of its implementation attracted many researchers attention. Scalar multiplication as one of the heaviest computations in elliptic curve, some efficient technique like Gallant–Lambert– Vanstone method which adopt scalar decompositions using efficient endomorphisms has been applied broadly in practical.In this paper, we focus on the vulnerability analysis for GLV method in binary curve for corner cases, and provide a thoroughly analysis for implementation of GLV method in special curve.","subitem_description_type":"Other"}]},"item_22_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"500","bibliographic_titles":[{"bibliographic_title":"第85回全国大会講演論文集"}],"bibliographicPageStart":"499","bibliographicIssueDates":{"bibliographicIssueDate":"2023-02-16","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicVolumeNumber":"2023"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":230530,"created":"2025-01-19T01:30:21.333310+00:00"}