Author:
Dahmen Erik,Okeya Katsuyuki,Takagi Tsuyoshi
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Avanzi, R.: On multi-exponentiation in cryptography, Cryptology ePrint Archive: Report 2002/154 (2002), available at
http://eprint.iacr.org/2002/154/
2. Lecture Notes in Computer Science;R. Avanzi,2004
3. Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)
4. Lecture Notes in Computer Science;H. Cohen,1998
5. ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31, 469–472 (1985)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Width-3 Joint Sparse Form;Information Security, Practice and Experience;2010
2. Minimal weight and colexicographically minimal integer representations;Journal of Mathematical Cryptology;2007-01