Author:
Debiao He,Jianhua Chen,Jin Hu
Subject
Hardware and Architecture,Information Systems,Signal Processing,Software
Reference29 articles.
1. A public key cryptosystem and a signature protocol based on discrete logarithms;ElGamal;IEEE Transactions on Information,1985
2. A method for obtaining digital signatures and public key cryptosystems;Rivest;Communications of the ACM,1978
3. V.S. Miller, Use of elliptic curves in cryptography, in: Proceedings of the Advances in Cryptology – Crypto’85, New York, USA, 1985, pp. 417–426.
4. Elliptic curve cryptosystem;Koblitz;Mathematics of Computation,1987
5. A. Shamir, Identity-based cryptosystems and signature protocols, in: Proceedings of the Advances in Cryptology – Crypto’84, Santa Barbara, USA, 1984, pp. 47–53.
Cited by
160 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献