Author:
Öztürk E.,Sunar B.,Savaş E.
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Agnew, G.B., Mullin, R.C., Vanstone, S.A.: An Implementation of Elliptic Curve Cryptosystems over
$F_{2}^{155}$
. IEEE Journal on Selected Areas in Communications 11(5), 804–813 (1993)
2. Berlekamp, E.: Algebraic Coding Theory. McGraw-Hill, New York (1968)
3. Crandall, R.E.: Method and Apparatus for Public Key Exchange in a Cryptographic System. U.S. Patent Number 5,159,632 (October 1992)
4. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
5. Kaliski Jr., B.S.: The Montgomery Inverse and its Applications. IEEE Transactions on Computers 44(8), 1064–1065 (1995)
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献