Author:
Fadavi Mojtaba,Farashahi Reza Rezaeian,Sabbaghian Soheila
Publisher
Springer International Publishing
Reference19 articles.
1. Avanzi, R., et al.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005)
2. Lecture Notes in Computer Science;DF Aranha,2014
3. Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.: Elligator: elliptic-curve points indistinguishable from uniform random strings. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM Conference on Computer and Communications Security, pp. 967–980. ACM (2013)
4. Lecture Notes in Computer Science;E Brier,2010
5. Lecture Notes in Computer Science;V Boyko,2000
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献