On the Use of Weber Polynomials in Elliptic Curve Cryptography
暂无分享,去创建一个
Christos D. Zaroliagis | Yannis C. Stamatiou | Elisavet Konstantinou | Y. Stamatiou | C. Zaroliagis | Elisavet Konstantinou
[1] Reinhard Schertz,et al. Weber's class invariants revisited , 2002 .
[2] L. G. Lidia,et al. A library for computational number theory , 1997 .
[3] E. Kaltofen,et al. Explicit Construction of the Hilbert Class Fields of Imaginary Quadratic Fields by Integer Lattice Reduction , 1991 .
[4] Sachar Paulus,et al. On the Generation of Cryptographically Strong Elliptic Curves , 1997 .
[5] T. Valente. A distributed approach to proving large numbers prime , 1992 .
[6] E. T.. An Introduction to the Theory of Numbers , 1946, Nature.
[7] Horst G. Zimmer,et al. Constructing elliptic curves with given group order over large finite fields , 1994, ANTS.
[8] E. Wright,et al. An Introduction to the Theory of Numbers , 1939 .
[9] Nigel P. Smart,et al. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .
[10] Christos D. Zaroliagis,et al. On the Efficient Generation of Elliptic Curves over Prime Fields , 2002, CHES.
[11] Erkay Savas,et al. Generating Elliptic Curves of Prime Order , 2001, CHES.
[12] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[13] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[14] Harald Baier,et al. Efficient Construction of Cryptographically Strong Elliptic Curves , 2000, INDOCRYPT.
[15] Andreas Enge,et al. Comparing Invariants for Class Fields of Imaginary Quadratic Fields , 2002, ANTS.
[16] Bimal Roy,et al. Progress in Cryptology —INDOCRYPT 2000 , 2002, Lecture Notes in Computer Science.
[17] Hans Eberle,et al. Generic implementations of elliptic curve cryptography using partial reduction , 2002, CCS '02.
[18] Erich Kaltofen,et al. An improved Las Vegas primality test , 1989, ISSAC '89.
[19] F. Morain,et al. Computing the cardinality of CM elliptic curves using torsion points , 2002, math/0210173.
[20] Harald Baier,et al. Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography , 2002 .
[21] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[22] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[23] Vom Fachbereich Informatik. Ecient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography , 2002 .