Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol. 22, pp. 644–654, 1976.
2. Lect Notes Comput Sci;V.S. Miller,1986
3. N. Koblitz, A Course in Number Theory and Cryptography, Spinger-Verlag, New York, 1987.
4. K. Koyama, U.M. Maurer, T. Okamoto and S.A. Vanstone, “New Public-Key Schemes Based on Elliptic Curves over the Ring Zn”, CRYPTO’ 91 Abstracts, Santa Barbara, CA, pp. 6-1 to 6-7, August 11–15, 1991.
5. R. Schoof, “Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p”, Mathematics of Computation, Vol.44, No.170, pp. 483–494, 1985.
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献