{"created":"2023-06-20T12:57:07.337920+00:00","id":1158,"links":{},"metadata":{"_buckets":{"deposit":"818c7ccb-2443-47f2-8e76-8c57fe03a612"},"_deposit":{"created_by":2,"id":"1158","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1158"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001158","sets":["22:33","25:26:51"]},"author_link":["96","2041","2042"],"item_9_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2005","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3574","bibliographicPageEnd":"229","bibliographicPageStart":"218","bibliographic_titles":[{"bibliographic_title":"10th Australasian Conference on Information Security and Privacy ACISP2005"}]}]},"item_9_description_4":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"LNCS","subitem_description_type":"Other"}]},"item_9_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Springer-Verlag"}]},"item_9_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_9_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"国際会議/International Conference"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Okeya, Katsuyuki"}],"nameIdentifiers":[{"nameIdentifier":"2041","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Takagi, Tsuyoshi"}],"nameIdentifiers":[{"nameIdentifier":"96","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60404802","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60404802"}]},{"creatorNames":[{"creatorName":"Vuillaume, Camille"}],"nameIdentifiers":[{"nameIdentifier":"2042","nameIdentifierScheme":"WEKO"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks"}]},"item_type_id":"9","owner":"2","path":["33","51"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-02-19"},"publish_date":"2010-02-19","publish_status":"0","recid":"1158","relation_version_is_last":true,"title":["Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks"],"weko_creator_id":"2","weko_shared_id":2},"updated":"2023-06-20T13:09:49.459154+00:00"}