1 |
V. S. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology-Proc. of CRYPTO'85, pp. 417-426, 1986.
|
2 |
NIST, http://csrc.nist.gov/encryption
|
3 |
IEEE, http://www.ieee.org
|
4 |
Youngho Park, Public Key Encryption, Vol. 16, No. 3, Physics&High Technology, March, 2007.
|
5 |
Eunhee Goo, Joonmo Kim, "Elliptic Curve Cryptography over the Real Number Plane," The 24th ITC-CSCC 2009, pp. 1177-1179, 2009.
|
6 |
Mark Stamp, Information Security:Principles and Practice, Wiley, 2005.
|
7 |
David J. Malan, Matt Welsh, Michael D. Smith, "A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography", First IEEE International Conference on Sensor and Ad-hoc Communications and Network, Oct. 2004.
|
8 |
N. Koblitz, "Elliptic Curve Cryptosystems," Mathemetics of Computation, Vol. 48, pp.203-209, 1987.
DOI
ScienceOn
|