共 30 条
[1]
Bernstein DJ, 2007, LECT NOTES COMPUT SC, V4833, P29
[2]
BLAKLEY GR, 1983, IEEE T COMPUT, V32, P497, DOI 10.1109/TC.1983.1676262
[3]
Brinci R., 2013, IACR CRYPTOL EPRINT, V2013, P5
[4]
Chow G. C. T., 2010, Proceedings 2010 International Conference on Field Programmable Logic and Applications (FPL 2010), P434, DOI 10.1109/FPL.2010.89
[6]
Ghosh Santosh, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P141, DOI 10.1007/978-3-642-36334-4_9
[7]
Hankerson D., 2004, Guide to Elliptic Curve Cryptography, DOI [10.1007/0-387-21846-73, DOI 10.1007/0-387-21846-73]
[8]
Javeed K, 2014, P 24 INT C FIELD PRO, P1, DOI DOI 10.1109/FPL.2014.6927452