Author:
Chen Chao,Zhang Fangguo,Zhao Chang-an
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference34 articles.
1. Elliptic curve cryptosystems;Koblitz;Math Comp,1987
2. Use of elliptic curves in cryptography;Miller,1985
3. Speeding the pollard and elliptic curve methods of factorization;Montgomery;Math Comp,1987
4. Faster addition and doubling on elliptic curves;Bernstein,2007
5. Kummer for genus one over prime-order fields;Karati;J Cryptol,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献