메뉴 건너뛰기




Volumn 1070, Issue , 1996, Pages 49-59

A public key cryptosystem based on elliptic curves over ℤ/nℤ equivalent to factoring

Author keywords

[No Author keywords available]

Indexed keywords

CURVE FITTING; GEOMETRY;

EID: 84947907424     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68339-9_5     Document Type: Conference Paper
Times cited : (20)

References (10)
  • 3
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz:Elliptic curve cryptosystems, Mathematics of Computation, 48 (1987), 203-209
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 5
    • 21844512149 scopus 로고
    • Low exponent attack against elliptic curve RSA
    • Lecture Notes in Computer Science, 917 Springer-Verlag
    • K. Kurosawa, K. Okada, S. Tsujii:Low exponent attack against elliptic curve RSA, Advances in Cryptology-ASIACRYPT'94, Lecture Notes in Computer Science, 917 (1995), Springer-Verlag, 376-383
    • (1995) Advances in Cryptology-ASIACRYPT'94 , pp. 376-383
    • Kurosawa, K.1    Okada, K.2    Tsujii, S.3
  • 7
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Lecture Notes in Computer Science, 218 SpringerVerlag
    • V. Miller:Uses of elliptic curves in cryptography, Advances in Cryptology: Proceedings of Crypto'85, Lecture Notes in Computer Science, 218 (1986), SpringerVerlag, 417-426
    • (1986) Advances in Cryptology: Proceedings of Crypto'85 , pp. 417-426
    • Miller, V.1
  • 10
    • 0019080452 scopus 로고
    • A modification of the RSA public-key encryption procedure
    • H.C. Williams:A modification of the RSA public-key encryption procedure, IEEE Transactions on Information Theory, IT-26, No. 6, (1980), 726-729
    • (1980) IEEE Transactions on Information Theory , vol.IT-26 , Issue.6 , pp. 726-729
    • Williams, H.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.