共 75 条
[41]
Knudsen EW, 1999, LECT NOTES COMPUT SC, V1716, P135
[42]
KOBLITZ N, 1992, LECT NOTES COMPUT SC, V576, P279
[43]
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[45]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[46]
Kocher P., 1996, LECT NOTES COMPUTER, V1109, P104, DOI DOI 10.1007/3-540-68697-5_9
[47]
KOMMERLING O, USENIX WORKSH SMARTC
[48]
KOYAMA K, 1993, LNCS, V740, P345
[49]
The advantages of elliptic curve cryptography for wireless security
[J].
IEEE WIRELESS COMMUNICATIONS,
2004, 11 (01)
:62-67
[50]
LIARDET PY, 2001, LNCS, V2162, P401