共 52 条
[4]
Azarderakhsh R., 2017, Submission NIST Post-Quantum Standardization Project, V152, P154
[5]
Bernstein DJ, 2008, LECT NOTES COMPUT SC, V5023, P389
[6]
Bernstein DJ, 2007, LECT NOTES COMPUT SC, V4833, P29
[7]
Bernstein Daniel J., 2013, Safecurves: choosing safe curves for ellipticcurve cryptography
[8]
BLAKLEY GR, 1983, IEEE T COMPUT, V32, P497, DOI 10.1109/TC.1983.1676262
[9]
Elliptic Curve Cryptography in Practice
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:157-175
[10]
Cohen H., 2005, Handbook of Elliptic and Hyperelliptic Curve Cryptography, DOI DOI 10.1201/9781420034981