Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes
暂无分享,去创建一个
[1] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[2] Kefa Rabah. Data Security and Cryptographic Techniques: A Review , 2004 .
[3] Igor A. Semaev,et al. Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p , 1998, Math. Comput..
[4] Kefa Rabah. A Review of RSA and Public-Key Cryptosystems , 2005 .
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[7] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[8] Kefa Rabah,et al. Theory and Implementation of Elliptic Curve Cryptography , 2005 .