共 9 条
- [1] Koblitz N., A Course in Number Theory and Cryptography, (1994)
- [2] Miller V., Uses of Elliptic Curves in Cryptography, Advances in Cryptology CRYPTO'85, pp. 417-426, (1986)
- [3] Ding Y., Key Management Scheme for WSN Using ECC, Journal of Xidian University, 35, 4, pp. 739-742, (2008)
- [4] Namal S., Georgantas K., Gurtov A., Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography, IEEE Wireless Communications and Networking Conference, pp. 1830-1835, (2013)
- [5] Kodali R.K., Budwal H.S., High Performance Scalar Multiplication for ECC, International Conference on Computer Communication and Informatics, pp. 1-4, (2013)
- [6] Lopez J., Dahab R., Improved Algorithms for Elliptic Curve Arithmetic in GF(2<sup>n</sup>), Lecture Notes In Computer Science: 1556, pp. 201-212, (1988)
- [7] Lu C.Y., Jen S.M., Laih C.S., A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication, IEEE Transactions on Computers, 62, 3, pp. 428-438, (2013)
- [8] Lopez J., Dahab R., Fast Multiplication on Elliptic Curves over GF (2m) without Pre Computation, Workshop on Cryptographic Hardware and Embedded Systems, pp. 316-327, (1999)
- [9] Standards for Efficient Cryptography, (2000)