Author:
Konstantinou Elisavet,Stamatiou Yannis C.,Zaroliagis Christos
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference38 articles.
1. Argyroudis P.: NTRG ECC-LIB WINCE—a WinCE port of ECC-LIB, available at: http://www.ntrg.cs.tcd.ie/~argp/ software/ntrg-ecc-lib-wince.html (2004)
2. Atkin A.O.L. and Morain F. (1993). Elliptic curves and primality proving. Math. Comput. 61: 29–67
3. Baier, H. (2002). Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography. PhD Thesis, Deptartment of Computer Science, Technical University of Darmstadt
4. Baier, H., Buchmann, J.: Efficient construction of cryptographically strong elliptic curves. In: Progress in Cryptology—INDOCRYPT 2000, LNCS, vol. 1977, pp. 191–202. Springer, Berlin Heidelberg New York (2000)
5. Berlekamp E.R. (1970). Factoring polynomials over large finite fields. Math Comput 24: 713–735
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献