Elliptic Curves and Cryptography
暂无分享,去创建一个
[1] Conclusions , 1989 .
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[4] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[5] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[6] Simon Singh,et al. The Code Book , 1999 .
[7] H. W. Lenstra,et al. Factoring integers with elliptic curves , 1987 .
[8] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[9] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[10] S. Davidson,et al. An Ultra-high Speed Public Key Encryption Processor , 1992, 1992 Proceedings of the IEEE Custom Integrated Circuits Conference.
[11] A. Wiles. Modular Elliptic Curves and Fermat′s Last Theorem(抜粋) (フェルマ-予想がついに解けた!?) , 1995 .
[12] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[13] Gordon B. Agnew,et al. An Implementation of Elliptic Curve Cryptosystems Over F2155 , 1993, IEEE J. Sel. Areas Commun..
[14] Bruce Schneier,et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists , 1996 .
[15] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[16] J. M. Pollard,et al. Theorems on factorization and primality testing , 1974, Mathematical Proceedings of the Cambridge Philosophical Society.