Author:
Obaid Mohammed Jabbar,Al Saffar Najlae Falah Hameed
Reference14 articles.
1. S. Tayal, N. Gupta, P. Gupta, D. Goyal, and M. Goyal, A review paper on network security and cryptography (Advances in Computational Sciences and Technology, India, 2017), pp. 763–770.
2. R. Merkle and M. Hellman, Hiding information and signatures in trapdoor knapsacks, IEEE transactions on Information Theory, 24(5):525–530, 1978.
3. R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21(2):120–126, 1978.
4. J. H. Silverma, The arithmetic of elliptic curves, volume 106. (Springer Science+Business, New York, 2009).
5. K. Koyama, U. M. Maurer, T. Okamoto, and S. A. Vanstone. New public-key schemes based on elliptic curves over the ring Zn, In Annual International Cryptology Conference, pages 252–266. Springer-Verlag Berlin Heidelberg, 1991.