1 |
G. Harper, A. Menezes, and S. Vanstone, "Public-key Cryptosystems with very small key length," Eurocrypto 92, Springer-Verlag. Balatonfured, Hungary, May 1992, pp. 163-172.
|
2 |
H.-D. Kim, S.-J. Cho, M.-J. Kwon, and H.-J. An, "A study on the cross-correlation function of extended Zeng sequences," The J. of The Korea Institute of Electronic Communication Sciences, vol. 7, no. 1, 2012, pp. 61-67.
과학기술학회마을
|
3 |
C.-H. Kim, S.-H. Oh, J.-I. Lim, K.-S. Suh, and J.-C. Yoon, "Operations in finite fields using modified method," J. Korea Institute of Information Security and Cryptography, vol. 8, no. 2, 1998, pp. 27-36.
과학기술학회마을
|
4 |
H. Cohen, A Course in Computational Algebraic Number Theory. New York : Springer-Verlag, 2000.
|
5 |
U.-S. Choi and S.-J. Cho, "Design of Binary Sequence with optimal Cross-correlation Values," J. of The Korea Institute of Electronic Communication Sciences, vol. 6, no. 4, 2011, pp. 539-544,
|
6 |
T. Itoh, O. Teechal, and S. Tsujii, "A fast algorithm for computing multiplicative inverse in using normal bases," J. Soc. Electro. Comm.(Japan), vol. 44, 1986, pp. 31-36.
|
7 |
Y. Kim, "A Fast Multiplier of Composite fields over finite fields," J. of The Korea Institute of Electronic Communication Sciences, vol. 6, no. 3, 2011, pp. 389-395.
과학기술학회마을
|
8 |
G. Agnew, T. Beth, B. Mullin, and S. Vanstone, "Arithmetic Operations in ," J. Cryptology, vol. 6, 1993, pp. 3-13.
DOI
|
9 |
Y. Kim, "Fast Sequential Optimal normal Bases Multipliers over finite fields," J. of The Korea Institute of Electronic Communication Sciences, vol. 8, no. 8, 2013, pp. 1207-1212.
과학기술학회마을
DOI
ScienceOn
|
10 |
U.-S. Choi, S.-J. Cho, and S.-H. Kwon, "Analysis of Cross Correlation of Extended Non-linear Binary Sequences," J. of The Korea Institute of Electronic Communication Sciences, vol. 7, no. 2, 2012, pp. 263-269.
과학기술학회마을
|
11 |
N. Koblitz, "Elliptic Curve cryptosystems," Math. Comp. 48, 1987, pp. 203-209.
DOI
ScienceOn
|