1 |
N. Koblitz. "Elliptic curve cryptosystems", Mathematics of Computation, vol. 48, no. 177, pp. 203-209, Jan. 1987
DOI
|
2 |
V.S. Miller. "Use of elliptic curves in cryptography," Advances in Cryptology, CRYPTO'85, LNCS 218, pp. 417-426, 1986.
|
3 |
Seog Chung Seo, Dong-Guk Han and Seokhie Hong, "TinyECCK : Efficient Implementation of Elliptic Curve Cryptosystem over on 8-bit Micaz Mote," Journal of the Korea Institute of Information Security and Cryptology, 18(3), pp.1338-1347, 2008.
|
4 |
M. Scott, "Optimal irreducible polynomials for arithmetic," Cryptology ePrint Archive 2007-192, May. 2007.
|
5 |
ATmel ATmega128(L) Datasheet, http://www.atmel.com, 2006.
|
6 |
D. Hankerson, A. Menezes and S. Vanstone, Guide to elliptic curve cryptography, Springer-Verlag, pp. 53-56, 2004.
|