Author:
Kaushik Shweta,Gandhi Charu
Reference16 articles.
1. W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol. IT-22, (1976), pp. 644–654.
2. R. Rivest, A. Shamir and L. Adeleman, A method for obtaining digital signatures and public key cryptosystems, Communication of the ACM, Vol. no 21, (1978), pp. 120–126.
3. T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transaction on Information Theory, IT-31(4), 1985, pp. 469–472.
4. N. Koblizt, Elliptic curve cryptosystem, Mathematics of Computation 48(177), 1987, pp. 203–209.
5. V. S. Miller, Use of elliptic curves in cryptography, Advances in Cryptology-Proceedings of Crypto’85, LNCS, vol. 218, Springer, 1986, pp. 417–426.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献