Author:
Thadvai Sandeep,Tiwari Deep Narayan,Jena Debasish,Ma Maode
Subject
Computer Science Applications,Modeling and Simulation
Reference23 articles.
1. Handbook of Applied Cryptography;Menezes,1996
2. Reducing elliptic curve logarithms to logarithms in a finite field;Menezes,1991
3. A batch verifying and detecting multiple RSA digital signatures;Hwang;Int. J. Comput. Num. Anal. Appl.,2002
4. A method for obtaining digital signatures and public-key cryptosystems;Rivest;Commun. ACM,1978
5. Parallel computation of the generating keys for RSA cryptosystems;Chang;Electron. Lett.,1996