Publisher
Springer International Publishing
Reference9 articles.
1. N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)
2. V.S. Miller, Use of elliptic curves in cryptography, in Advances in cryptology – CRYPTO ’85, Bd. 218, Lecture notes in computer science (1986), S. 417–426
3. D. Hankerson, A. Menezes, S. Vanstone, Guide to elliptic curve cryptography (Springer, 2004)
4. NIST, Fips 186-4: digital signature standard (2013). https://csrc.nist.gov/publications/detail/fips/186/4/final
5. M.J. Jacobson, N. Koblitz, J.H. Silverman, A. Stein, E. Teske, Analysis of the Xedni calculus attack. Des. Codes Cryptogr. 20, 41–64 (2000)