共 14 条
[2]
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[3]
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[4]
Koblitz N., 1994, A Course in Number Theory and Cryptography
[5]
Lein Harn, 1999, Proceedings of 1999 International Workshop on Cryptographic Techniques and E-Commerce, P126
[6]
LI Y, 2000, ELECTRON LETT, V36, P527
[7]
LIN CH, 2001, P 11 NAT C INF SEC, P331
[8]
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[9]
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[10]
Miller V. S., 1985, LNCS, V218, P417