共 22 条
[1]
BONEH D, 2001, ADV CRYPTOLOGY
[2]
Chen H.P., 2007, CHINA INFORM SECURIT, V29, P47
[4]
JOHNSON D, 1999, 9934 CORR
[5]
Jurisic A, 1997, DR DOBBS J, V22, P26
[6]
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[7]
Miller V., 1986, USE ELLIPTIC CURVES
[8]
Miri A, 2013, ADVANCED SECURITY AND PRIVACY FOR RFID TECHNOLOGIES, P1, DOI 10.4018/978-1-4666-3685-9
[9]
Nan X.H., 2006, CHINA INFORM SECURIT, V28, P12
[10]
Nan X.H., 2008, CHINA INFORM SECURIT, V30, P21