Cryptography Reference
In-Depth Information
References
[1] MFIPS 186-2.
Digital signature standard
. Federal Information Pro-
cessing Standards Publication 186. U. S. Dept. of Commerce/National
Institute of Standards and Technology, 2000.
[2] M. Abdalla, M. Bellare, and P. Rogaway. The Oracle Di
e-Hellman
assumption and an analysis of DHIES.
Topics in cryptology - CT RSA
01.
volume 2020 of
Lecture Notes in Computer Science
, Springer, Berlin,
2001, pages 143-158.
[3] L. Adleman, J. DeMarrais, and M.-D. Huang. A subexponential algo-
rithm for discrete logarithms over hyperelliptic curves of large genus
over GF(
q
).
Theoret. Comput. Sci.
, 226(1-2): 7-18, 1999.
[4] L.V.Ahlfors.
Complex analysis
. McGraw-Hill Book Co., New York,
third edition, 1978. An introduction to the theory of analytic func-
tions of one complex variable, International Series in Pure and Applied
Mathematics.
[5] W. S. Anglin. The square pyramid puzzle.
Amer. Math. Monthly
, 97(2):
120-124, 1990.
[6] M. F. Atiyah and C. T. C. Wall. Cohomology of groups. In
Algebraic
number theory (Proc. Instructional Conf., Brighton, 1965)
, pages 94-
115. Thompson, Washington, D.C., 1967.
[7] A. O. L. Atkin and F. Morain. Elliptic curves and primality proving.
Math. Comp.
, 61(203):29-68, 1993.
[8] A. O. L. Atkin and F. Morain. Finding suitable curves for the elliptic
curve method of factorization.
Math. Comp.
, 60(201):399-405, 1993.
[9] R. Balasubramanian and N. Koblitz. The improbability that an ellip-
tic curve has subexponential discrete log problem under the Menezes-
Okamoto-Vanstone algorithm.
J. Cryptology
, 11(2):141-145, 1998.
[10] J. Belding A Weil pairing on the
p
-torsion of ordinary elliptic curves
over
K
[
].
J. Number Theory
(to appear).
[11] D. Bernstein and T. Lange. Faster addition and doubling on elliptic
curves.
Asiacrypt 2007
(to appear).
[12] I. F. Blake, G. Seroussi, and N. P. Smart.
Elliptic curves in cryptogra-
phy
, volume 265 of
London Mathematical Society Lecture Note Series
.
Search WWH ::
Custom Search