Cryptography Reference
In-Depth Information
[68] S. Lang. Elliptic curves: Diophantine analysis , volume 231 of
Grundlehren der Mathematischen Wissenschaften .
Springer-Verlag,
Berlin, 1978.
[69] S. Lang. Abelian varieties . Springer-Verlag, New York, 1983. Reprint
of the 1959 original.
[70] S. Lang. Elliptic functions , volume 112 of Graduate Texts in Mathemat-
ics . Springer-Verlag, New York, second edition, 1987. With an appendix
by J. Tate.
[71] S. Lang. Algebra , volume 211 of Graduate Texts in Mathematics .
Springer-Verlag, New York, third edition, 2002.
[72] H. Lange and W. Ruppert. Addition laws on elliptic curves in arbitrary
characteristics. J. Algebra , 107(1):106-116, 1987.
[73] G.-J. Lay and H. G. Zimmer. Constructing elliptic curves with given
group order over large finite fields. In Algorithmic number theory
(Ithaca, NY, 1994) , volume 877 of Lecture Notes in Comput. Sci. , pages
250-263. Springer-Verlag, Berlin, 1994.
[74] H. W. Lenstra, Jr. Elliptic curves and number-theoretic algorithms. In
Proceedings of the International Congress of Mathematicians, Vol. 1,
2 (Berkeley, Calif., 1986) , pages 99-120, Providence, RI, 1987. Amer.
Math. Soc.
[75] H. W. Lenstra, Jr. Factoring integers with elliptic curves. Ann. of Math.
(2) , 126(3):649-673, 1987.
[76] E. Liverance. Heights of Heegner points in a family of elliptic curves .
PhD thesis, Univ. of Maryland, 1993.
[77] B. Mazur. Rational isogenies of prime degree (with an appendix by D.
Goldfeld). Invent. Math. , 44(2):129-162, 1978.
[78] H. McKean and V. Moll. Elliptic curves. Function theory, geometry,
arithmetic . Cambridge University Press, Cambridge, 1997.
[79] A. Menezes and M. Qu. Analysis of the Weil descent attack of Gaudry,
Hess and Smart. In Topics in cryptology—CT-RSA 2001 (San Fran-
cisco, CA) , volume 2020 of Lecture Notes in Comput. Sci. , pages 308-
318. Springer-Verlag, Berlin, 2001.
[80] A. J. Menezes, T. Okamoto, and S. A. Vanstone. Reducing elliptic curve
logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory ,
39(5):1639-1646, 1993.
[81] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of
applied cryptography . CRC Press Series on Discrete Mathematics and
its Applications. CRC Press, Boca Raton, FL, 1997. With a foreword
by R. L. Rivest.
Search WWH ::




Custom Search