Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. Agnew, G.B., Mullin, R.C., Vanstone, S.A.: An implementation of elliptic curve cryptosystems over F
2
155. IEEE Journal on Selected Areas in Communications. 11(5) (June 1993) 804–813
2. Cohen, H. A course in computational algebraic number theory. Graduate Texts in Math., vol. 138. Springer Verlag, Berlin (1993)
3. Coppersmith, D.: Fast evaluation of discrete logarithms in fields of characteristic two. IEEE Transactions on Information Theory 30 (1984) 587–594
4. Cunningham Project. <
ftp://sable.ox.ac.uk/pub/math/cunningham
>.
5. Lect Notes Comput Sci;S. Gao,1995
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment;GLOBECOM 2022 - 2022 IEEE Global Communications Conference;2022-12-04
2. The circulant hash revisited;Journal of Mathematical Cryptology;2020-12-03
3. On the Efficiency of Scalar Multiplication on the Elliptic Curves;Information Systems and Technologies to Support Learning;2018-10-25
4. Shamir’s Secret Sharing Scheme in Parallel;Security with Intelligent Computing and Big-data Services;2018
5. A new ElGamal-like cryptosystem based on matrices over groupring;Neural Computing and Applications;2016-12-01