Author:
Lenstra Arjen K.,Hughes James P.,Augier Maxime,Bos Joppe W.,Kleinjung Thorsten,Wachter Christophe
Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. Lecture Notes in Computer Science;S Cavallar,2000
2. Certicom Research. Standards for efficient cryptography 2: Recommended elliptic curve domain parameters. Standard SEC2, Certicom (2000)
3. Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (2008)
4. Coppersmith, D.: Modifications to the number field sieve. Journal of Cryptology 6(3), 169–180 (1993)
5. Darkmirage. PS3 completely cracked (2011),
http://www.darkmirage.com/2011/01/06/ps3-completely-cracked/
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献