Publisher
Springer International Publishing
Reference35 articles.
1. Auer, R., Top, J.: Legendre elliptic curves over finite fields. J. Number Theor. 95(2), 303–312 (2002)
2. Azarderakhsh, R., Jao, D., Kalach, K., Koziel, B., Leonardi, C.: Key compression for isogeny-based cryptosystems. In: Emura, K., Hanaoka, G., Zhang, R. (eds.) Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi’an, China, 30 May – 03 June 2016, pp. 1–10. ACM (2016)
3. Lecture Notes in Computer Science;DJ Bernstein,2006
4. Bernstein, D.J.: Elliptic vs. Hyperelliptic, part I. Talk at ECC, September 2006. (http://cr.yp.to/talks/2006.09.20/slides.pdf)
5. Lecture Notes in Computer Science;DJ Bernstein,2014
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献