Elliptic curve cryptosystem - The answer to strong, fast public-key cryptography for securing constrained environments
暂无分享,去创建一个
[1] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[5] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[6] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[9] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[10] Hugh C. Williams,et al. A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.