Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Lecture Notes in Computer Science;A.K. Lenstra,2000
2. Lecture Notes in Computer Science;A.K. Lenstra,2000
3. Avanzi, R.M.: The Complexity of Certain Multi-Exponentiation Techniques in Cryptography. J. Cryptology 18, 357–373 (2005)
4. Chen, X., Wang, Y.: Asurvey of public key cryptography. Journal of China institute of communications 25(8), 109–118 (2004)(in Chinese)
5. Verheul, E.R.: Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. J. Cryptology 17(4), 277–296 (2004)