Object-oriented analysis and design of Elliptic Curve Cryptosystem
暂无分享,去创建一个
[1] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[2] Christine L. MacKenzie,et al. Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[3] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[4] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[5] Ed Dawson,et al. PKI, elliptic curve cryptography, and digital signatures , 1999, Comput. Secur..