Elliptic curve cryptosystem
暂无分享,去创建一个
[1] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[4] Masayuki Noro,et al. Risa/Asir—a computer algebra system , 1992, ISSAC '92.
[5] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[6] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[7] Takakazu Satoh,et al. Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves , 1998 .
[8] Kazuhiro Yokoyama,et al. Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 , 2000, Public Key Cryptography.
[9] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[10] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[11] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[12] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[13] A. Atkin,et al. ELLIPTIC CURVES AND PRIMALITY PROVING , 1993 .
[14] R. Schoof. Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p , 1985 .
[15] Kazuhiro Yokoyama,et al. Efficient Implementation of Schoof's Algorithm , 1998, ASIACRYPT.