Author:
Galbraith Steven D.,Lin Xibin,Scott Michael
Publisher
Springer Berlin Heidelberg
Reference35 articles.
1. Lecture Notes in Computer Science;A. Antipa,2006
2. Lecture Notes in Computer Science;R.M. Avanzi,2004
3. Avanzi, R., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of Elliptic and Hyperelliptic Cryptography. Chapman and Hall/CRC (2006)
4. Lecture Notes in Computer Science;D.J. Bernstein,2006
5. Bernstein, D.J.: Elliptic vs. Hyperelliptic, part 1 ECC, Toronto, Canada (2006), http://www.cacr.math.uwaterloo.ca/conferences/2006/ecc2006/slides.html
Cited by
70 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献