1 |
V. Miller, "Use of elliptic curves in cryptography," Advances in Cryptology-CRYPTO '85, LNCS, Vol. 218, 1986, pp. 417-428, Springer
|
2 |
D.V. Bailey and C. Paar, "Efficient arithmetic in finite field extensions with application in elliptic curve cryptography," Journal of Cryptology, Vol. 14, 2001, pp.153-176
DOI
|
3 |
S. Baktir and B. Sunar, "Optimal Tower Fields," IEEE Transactions on Computers, Vol.53, No.10, 2004, pp. 1231-1243
DOI
ScienceOn
|
4 |
N.P. Smart, "A comparison of different finite fields for elliptic curve cryptosystems," Computers and Mathematics with Applications, Vol.42, 2001, pp. 91-100
DOI
ScienceOn
|
5 |
T. Kobayashi, "Base- method for elliptic curves over OEF," IEICE Trans. Fundamentals, Vol. E83-A, No.4, 2000, pp. 679-686
|
6 |
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, Vol.48, 1987, pp. 203-209
DOI
ScienceOn
|