-
1
-
-
85015402934
-
Use of elliptic curves in cryptography. Advances in Cryptology-CRYPTO’85
-
Miller, V. S.: Use of elliptic curves in cryptography. Advances in Cryptology-CRYPTO’85, Lecture Notes in Computer Science, 218 (1986) 417–426
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
2
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comp. 48 (1987) 203–209
-
(1987)
Math. Comp
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
5
-
-
85030330304
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes, A. J., Vanstone, S., Okamoto T.: Reducing elliptic curve logarithms to logarithms in a finite field. Proc. of STOC’91 (1991) 80–89
-
(1991)
Proc. of STOC’91
, pp. 80-89
-
-
Menezes, A.J.1
Vanstone, S.2
Okamoto, T.3
-
6
-
-
84919085619
-
An improved algorithm for computing logarithm over GF(P)and its cryptographic significance
-
Pohlig, S. C., Hellman, M. E.: An improved algorithm for computing logarithm over GF(p)and its cryptographic significance. IEEE Trans. Information Theory, IT-24,1 (1978) 106–110
-
(1978)
IEEE Trans. Information Theory
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
7
-
-
0018724062
-
A subexponential algorithm for the discrete logarithm problem with applications to cryptography
-
Adleman, L. M.: A subexponential algorithm for the discrete logarithm problem with applications to cryptography. Proc. of IEEE 20th Symp. on Foundations of Comp. Sci. (1979) 55–60
-
(1979)
Proc. of IEEE 20Th Symp. on Foundations of Comp. Sci
, pp. 55-60
-
-
Adleman, L.M.1
-
8
-
-
0348022988
-
Elliptic curve implementation of zero-knowledge blobs
-
Koblitz, N.: Elliptic curve implementation of zero-knowledge blobs. Journal of Cryptology, vol. 4, No. 3 (1991) 207–213
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 207-213
-
-
Koblitz, N.1
-
10
-
-
84889062986
-
Building cyclic elliptic curves modulo large primes. Advances in Cryptology-EUROCRYPT’91
-
Morain, F., Building cyclic elliptic curves modulo large primes. Advances in Cryptology-EUROCRYPT’91, Lecture Notes in Computer Science, 547 (1991) 328–336
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 328-336
-
-
Morain, F.1
-
11
-
-
84947703281
-
On secure elliptic curves against the “reduction attack” and their design strategy
-
10A, IEICE Tech. Report, ISEC93-100
-
Chao, J., Tanada, K., Tsujii S.: On secure elliptic curves against the “reduction attack” and their design strategy. Proc. of SCIS’94 (1994) 10A, IEICE Tech. Report, ISEC93-100, 29–37
-
(1994)
Proc. of SCIS’94
, pp. 29-37
-
-
Chao, J.1
Tanada, K.2
Tsujii, S.3
-
12
-
-
84966233278
-
Elliptic curves over finite fields and the computation of square roots mod p
-
Schoof, R.: Elliptic curves over finite fields and the computation of square roots mod p. Math. Comp. 44 (1985) 483–494
-
(1985)
Math. Comp
, vol.44
, pp. 483-494
-
-
Schoof, R.1
-
14
-
-
0001262977
-
Probabilistic algorithm in finite fields
-
Robin, M. O.: Probabilistic algorithm in finite fields. SIAM J. on Comput., Vol.9, No.2 (1980) 273–280
-
(1980)
SIAM J. on Comput.
, vol.9
, Issue.2
, pp. 273-280
-
-
Robin, M.O.1
-
17
-
-
85028746390
-
On Discrete Logarithm Problems over elliptic curves with p-divisible groups
-
Chao, J., Ikemoto, H., Tanada, K., Tsujii, S.: On Discrete Logarithm Problems over elliptic curves with p-divisible groups. Proc. of Joint Workshop on Information Security and Cryptography, JW-ISC93 (1993) 99–104
-
(1993)
Proc. of Joint Workshop on Information Security and Cryptography, JW-ISC93
, pp. 99-104
-
-
Chao, J.1
Ikemoto, H.2
Tanada, K.3
Tsujii, S.4
|