Author:
Kumar Gautam,Saini Hemraj
Reference27 articles.
1. W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976).
https://doi.org/10.1109/TIT.1976.1055638
2. V.S. Miller, Use of elliptic curves in cryptography. Adv. Cryptol. 218, 417–426 (1986),
dl.acm.org/citation.cfm?id=704566
3. N. Koblitz, Elliptic curve cryptosystems. Math Comput. 48, 203–209 (1987).
https://doi.org/10.1090/S0025-5718-1987-0866109-5
4. P.W. Shor, Algorithms for quantum computation: discrete logarithms and factorings, in Proceedings of the 35th Annual Symposium on Foundations of Computer Science (1994), pp. 124–134.
https://doi.org/10.1109/sfcs.1994.365700
5. A. Kitaev, Quantum measurements and the Abelian stabilizer problem, in Electronic Colloquium on Computational Complexity (1996),
http://eccc.hpi-web.de/eccc-reports/1996/TR96-003/index.html
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献