Author:
Li Xiao,Lv Chang,Pan Zhizhong
Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. Diffie W and Hellman M E, New directions in cryptography, IEEE Transactions on Information Theory, 1976, 22(6): 644–654.
2. Rivest R L, Shamir A, and Adleman L, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 1978, 21(2): 120–126.
3. ElGamal T, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 1985, 31(4): 469–472.
4. Koblitz N, Elliptic curve cryptosystems, Mathematics of Computation, 1987, 48(177): 203–209.
5. Miller V S, Use of elliptic curves in cryptography, Conference on the Theory and Application of Cryptographic Techniques, Springer Berlin Heidelberg, Berlin, 1985, 417–426.