暂无分享,去创建一个
[1] Michael Laska,et al. An algorithm for finding a minimal Weierstrass equation for an elliptic curve , 1982 .
[2] Yan Grunenberger,et al. The Cost of the "S" in HTTPS , 2014, CoNEXT.
[3] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[4] Nigel P. Smart,et al. The Discrete Logarithm Problem on Elliptic Curves of Trace One , 1999, Journal of Cryptology.
[5] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[6] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[7] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[10] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[11] Yvette Ghormley. Business Continuity and Disaster Recovery Plans , 2009 .
[12] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.