USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY

被引:2120
作者
MILLER, VS
机构
关键词
D O I
10.1007/3-540-39799-x_31
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:417 / 426
页数:10
相关论文
共 21 条
[1]  
Adleman L., 1979, 20th Annual Symposium of Foundations of Computer Science, P55, DOI 10.1109/SFCS.1979.2
[2]  
Birch B.J., 1963, J REINE ANGEW MATH, V212, P7
[3]  
BIRCH BJ, 1965, J REINE ANGEW MATH, V218, P79
[4]   ON THE EQUATION Y2=X(X2+P) [J].
BREMNER, A ;
CASSELS, JWS .
MATHEMATICS OF COMPUTATION, 1984, 42 (165) :257-264
[5]  
BUHLER J, CONJECTURE BIRCH SWI
[6]  
CASSELS JWS, 1966, J LONDON MATH SOC, V41, P193
[7]  
COPPERSMITH D, 1985, IBM RC10985 RES REP
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]   THE BRUN-TITCHMARSH THEOREM - APPLICATION TO THE FERMAT THEOREM [J].
FOUVRY, E .
INVENTIONES MATHEMATICAE, 1985, 79 (02) :383-407
[10]  
Lang Serge, 1978, ELLIPTIC CURVES DIOP