1 |
W.Diffie, M.E.Hellman, "New directions in cryptography," IEEE Trans. on Information Theory, Vol. 22, No. 6, pp.644-654, 1976. DOI: http://dx.doi.org/10.1109/TIT.1976.1055638
DOI
|
2 |
T.ElGamal, "A public key cryptosystem and a signature scheme based on the discrete logarithm," IEEE Trans. on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985. DOI: http://dx.doi.org/10.1109/TIT.1985.1057074
DOI
|
3 |
M.O.Rabin, "Digitalized Signatures and public Key Functions as Interactable as Factorization," Technical Report, MIT/LCS/TR212, MIT Lab., Computer Science, Cambridge, Mass 1979.
|
4 |
R.L.Rivest, A. Shamir, L.Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communitations of the ACM, Vol. 21, No. 2, pp. 120-126, 1978. DOI: http://dx.doi.org/10.1145/359340.359342
DOI
ScienceOn
|
5 |
M.Wiener and R.Zuccherato, "Fast Attacks on Elliptic Curve Crypto-system," in Selected Areas in Crypto-graphy-SAC'98, 1998.
|
6 |
A.Menezes, "Elliptic Curve Crypto systems," CryptoBytes, Vol. 1, No. 2, pp. 1-4, 1995.
|
7 |
V.S.Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology-Proc. of CRYPTO'85, pp. 417-426, 1986.
|
8 |
Eunhee Goo, Joonmo Kim, "Elliptic Curve Cryptography over the Real Number Plane," The 24th ITC-CSCC 2009, pp. 1177-1179, 2009.
|