-
1
-
-
0025824903
-
An implementation for a fast public key cryptosystem
-
G. Agnew, R. Mullin, I. Onyszchuk, and S. Vanstone, “An implementation for a fast public key cryptosystem,” J. Cryptol., vol. 3, pp. 63–79, 1991.
-
(1991)
J. Cryptol
, vol.3
, pp. 63-79
-
-
Agnew, G.1
Mullin, R.2
Onyszchuk, I.3
Vanstone, S.4
-
2
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inform. Theory, vol. IT-22, pp. 644–654, 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
3
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inform. Theory, vol. IT-31, pp. 469–472, 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
5
-
-
85030323959
-
Constructing elliptic curve cryptosystems in characteristic 2
-
New York: Springer-Verlag
-
N. Koblitz, “Constructing elliptic curve cryptosystems in characteristic 2,” in Advances in Cryptology: Proceedings of Crypto’ 90, Lecture Notes in Computer Science, vol. 537. New York: Springer-Verlag, 1991, pp. 156–167.
-
(1991)
Advances in Cryptology: Proceedings of Crypto'90, Lecture Notes in Computer Science
, vol.537
, pp. 156-167
-
-
Koblitz, N.1
-
6
-
-
0002139049
-
The discrete logarithm problem
-
K. McCurley, “The discrete logarithm problem,” in Cryptol. Computat. Number Theory, Proc. Symp. Appl. Math., vol. 42, pp. 49–74, 1990.
-
(1990)
Cryptol. Computat. Number Theory, Proc. Symp. Appl. Math
, vol.42
, pp. 49-74
-
-
McCurley, K.1
-
7
-
-
85030330304
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, and S. Vanstone, “Reducing elliptic curve logarithms to logarithms in a finite field,” in Proc. 22nd Annu. ACM Symp. Theory Computing, 1991, pp. 80–89.
-
(1991)
Proc. 22nd Annu. ACM Symp. Theory Computing
, pp. 80-89
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
8
-
-
0010763167
-
Isomorphism classes of elliptic curves over finite fields of characteristic 2
-
A. Menezes and S. Vanstone, “Isomorphism classes of elliptic curves over finite fields of characteristic 2,” Utilitas Mathematica, vol. 38, pp. 135–154, 1990.
-
(1990)
Utilitas Mathematica
, vol.38
, pp. 135-154
-
-
Menezes, A.1
Vanstone, S.2
-
9
-
-
84941434301
-
Elliptic curve cryptosystems and their implementation
-
A. Menezes and S. Vanstone, “Elliptic curve cryptosystems and their implementation,” submitted to J. Cryptol., 1991.
-
(1991)
submitted to J. Cryptol
-
-
Menezes, A.1
Vanstone, S.2
-
10
-
-
84941451772
-
-
to appear in Math. Computat.
-
A. Menezes, S. Vanstone, and R. Zuccherato, “Counting points on elliptic curves over F 2 m”, to appear in Math. Computat., 1992.
-
(1992)
and R
-
-
Menezes, A.1
Vanstone, S.2
-
11
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
New York: Springer-Verlag
-
V. Miller, “Uses of elliptic curves in cryptography,” in Advances in Cryptology: Proceedings of Crypto ’85, Lecture Notes in Computer Science,” vol. 218. New York: Springer-Verlag, 1986, pp. 417–426.
-
(1986)
Advances in Cryptology: Proceedings of Crypto ’85, Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
12
-
-
62749169902
-
Short programs for functions on curves
-
V. Miller, “Short programs for functions on curves,” unpublished manuscript, 1986.
-
(1986)
unpublished manuscript
-
-
Miller, V.1
-
13
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
P. Montgomery, “Speeding the Pollard and elliptic curve methods of factorization,” Math. Computat., vol. 48, pp. 243–264, 1987.
-
(1987)
Math. Computat
, vol.48
, pp. 243-264
-
-
Montgomery, P.1
-
15
-
-
45549114790
-
Optimal normal bases in GF(pn)
-
R. Mullin, I. Onyszchuk, S. Vanstone, and R. Wilson, “Optimal normal bases in GF(pn),” Discrete Appl. Math., vol. 22, pp. 149-161,1988/89.
-
(1988)
Discrete Appl. Math
, vol.22
, pp. 149-161
-
-
Mullin, R.1
Onyszchuk, I.2
Vanstone, S.3
Wilson, R.4
-
17
-
-
84966238549
-
Monte Carlo methods for index computation (mode p)
-
J. Pollard, “Monte Carlo methods for index computation (mode p),” Math. vol. 32, 918–924, 1978.
-
(1978)
Math
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
18
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, “Efficient signature generation by smart cards,” J. Cryptol., vol. 4, pp. 1612–1674, 1991.
-
(1991)
J. Cryptol
, vol.4
, pp. 1612-1674
-
-
Schnorr, C.1
-
19
-
-
84966233278
-
Elliptic curves over finite fields and the computation of square roots mod p
-
R. Schoof, “Elliptic curves over finite fields and the computation of square roots mod p,” Math. Computat., vol. 44, pp. 483–494, 1985.
-
(1985)
Math. Computat
, vol.44
, pp. 483-494
-
-
Schoof, R.1
-
20
-
-
38249034734
-
Nonsingular plane cubic curves over finite fields
-
R. Schoof, “Nonsingular plane cubic curves over finite fields,” J. Combinatorial Theory, vol. A46, pp. 183–211, 1987.
-
(1987)
J. Combinatorial Theory
, vol.A46
, pp. 183-211
-
-
Schoof, R.1
|