References
- J. Buchmann, H. C. Williams "A key-exchange system based on imaginary quadratic fields", Journal of Cryptology 1,3 pp.107-118, 1988. https://doi.org/10.1007/BF02351719
- N. Koblitz, "Elliptic curve cryptosystems", Math. Comp., 48, pp.203-209, 1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- D. Huhnlein, " Efficient implementation of cryptosystem based on non-maximal imaginary quadratic orders, Proc. of SAC'99, Springer, LNCS 1758, pp.150-167, 2000.
- Yongtae Kim, Chang-han Kim," On the public key cryptosystems over class semigroups of imaginary quadratic non-maximal orders", Commun. Korean Math. Soc., 21, No. 3, pp. 577-586, 2006. https://doi.org/10.4134/CKMS.2006.21.3.577
- K. F. Gauss, "Disquisitiones Arithmeticae", translation A. C. Clarke, S.J., Yale Univ. Press, 1966.
- 김용태, 복소이차 류 반군위에서의 암호계의 안전성에 관한 소고, 한국전자통신학회논문지, 6권, 1호, pp. 90-96, 2011.
-
D. Cox, Primes of the form
$x^2+ny^2$ , John Wiley & Son, New York, 1989. - http://www.math.edu/users/villegas/gpbook
- http://pari.math.u-bordeau.fr/
- 김용태, "Efficient Serial Gaussian Normal Basis Multiplier over Binary Extension Fields, 한국전자통신학회논문지, 4권, 3호, pp. 197-203, 2009.
- 김용태, "복소 이차체위에서 공개키 암호계에 관한 소고, 한국전자통신학회논문지, 4권, 4호, pp. 90-96, 2009.
- D. Huhnlein, "Cryptosystems based on quadratic orders, PhD-thesis, TU-Darmstadt, Germany, 2000.