Author:
Agnew G. B.,Beth T.,Mullin R. C.,Vanstone S. A.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference6 articles.
1. G. Agnew, R. Mullin, and S. Vanstone, An implementation for a fast public key cryptosystem,J. Cryptology,3(2), 63–79.
2. W. Diffie and M. Hellman, New directions in cryptography,IEEE Trans. Inform. Theory,22(6) (1976), 644–654.
3. T. Itoh, O. Teechai, and S. Tsujii, A fast algorithm for computing multiplicative inverses inGF(2
t
) using normal bases,J. Soc. Electron. Comm. (Japan),44 (1986), 31–36.
4. H. W. Lenstra, Jr., and R. J. Schoof, Primitive normal bases for finite fields,Math. Comp.,48 (1987), 217–232.
5. O. Ore, On a special class of polynomials,Trans. Amer. Math. Soc.,35 (1933), 559–584.
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献