Elliptic curve cryptosystems using curves of smooth order over the ring Zn
暂无分享,去创建一个
[1] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[2] P. Erdös,et al. On a problem of Oppenheim concerning “factorisatio numerorum” , 1983 .
[3] H. W. Lenstra,et al. Factoring integers with elliptic curves , 1987 .
[4] Christoph G. Günther,et al. An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.
[5] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[6] Ueli Maurer,et al. Non-interactive Public-Key Cryptography , 1991, EUROCRYPT.
[7] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[8] Atsuko Miyaji,et al. Elliptic Curve Cryptosystems Immune to Any Reduction into the Discrete Logarithm Problem (Special Section on Cryptography and Information Security) , 1993 .
[9] Joseph H. Silverman,et al. The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.
[10] Paul Erdös,et al. On the normal number of prime factors of p-1 and some related problems concerning euler's o/-function , 1935 .
[11] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[12] A. Atkin,et al. ELLIPTIC CURVES AND PRIMALITY PROVING , 1993 .
[13] Donald E. Knuth,et al. Analysis of a Simple Factorization Algorithm , 1976, Theor. Comput. Sci..
[14] N. Demytko,et al. A New Elliptic Curve Based Analogue of RSA , 1994, EUROCRYPT.
[15] Ralph Howard,et al. Data encryption standard , 1987 .
[16] Tatsuaki Okamoto,et al. New Public-Key Schemes Based on Elliptic Curves over the Ring Zn , 1991, CRYPTO.
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[20] Ueli Maurer,et al. Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1994, CRYPTO.
[21] David A. Cox. Primes of the Form x2 + ny2: Fermat, Class Field Theory, and Complex Multiplication , 1989 .
[22] R. Schoof. Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p , 1985 .
[23] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[24] Horst G. Zimmer,et al. Constructing elliptic curves with given group order over large finite fields , 1994, ANTS.
[25] E. Bach. Explicit bounds for primality testing and related problems , 1990 .