Author:
Zhang Fangguo,Zhang Futai,Wang Yumin
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference12 articles.
1. Koblitz N. Elliptic curve cryptosystems.Mathematics of Computation, 1987, 48(177): 203–209.
2. Koblitz N. Hyperelliptic cryptography.Journal of Cryptology, 1989, (1): 139–150.
3. Cantor D G. Computing in the Jacobian of a hyperelliptic curve.Mathematics of Computation, 1987, 48: 95–101.
4. Frey G, Rück H. A remark concerningm-divisibility and the discrete logarithm in the divisor class group of curves.Mathematics of Computation, 1994, 62: 865–874.
5. Sakai Y, Sakurai K, Ishizuka H. Secure hyperelliptic cryptosystems and their performance. InPKC’98, Imai H, Zheng Y (eds.), Springer-Verlag, LNCS 1431, Pacifico Yokohama, Japan, February, 1998, pp. 164–181.