The Implementation of Elliptic Curve Cryptosystems
暂无分享,去创建一个
[1] Ian F. Blake,et al. Low complexity normal bases , 1989, Discret. Appl. Math..
[2] T. Rosati. A high speed data encryption processor for public key cryptography , 1989, 1989 Proceedings of the IEEE Custom Integrated Circuits Conference.
[3] Ronald C. Mullin,et al. Optimal normal bases in GF(pn) , 1989, Discret. Appl. Math..
[4] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[5] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[6] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[7] Joseph H. Silverman,et al. The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.
[8] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[9] Johan Håstad,et al. On Using RSA with Low Exponent in a Public Key Network , 1985, CRYPTO.
[10] J. Hastd,et al. "On using RSA with low exponent in a public key network," Proc. of Crypto'85 , 1985 .
[11] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.