共 11 条
[2]
Dusse S.R., 1990, P WORKSH THEOR APPL, P230
[4]
Kerry C. F., 2013, FIPS PUB 186-4
[5]
M'Raihi D., 1996, 3rd ACM Conference on Computer and Communications Security, P58, DOI 10.1145/238168.238187
[6]
MONTGOMERY PL, 1985, MATH COMPUT, V44, P519, DOI 10.1090/S0025-5718-1985-0777282-X
[7]
Schnorr C. P., 1991, Journal of Cryptology, V4, P161, DOI 10.1007/BF00196725
[9]
Batch Public Key Cryptosystem with batch multi-exponentiation
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 62
:196-204