Cryptography Reference
In-Depth Information
[68] S. Lang.
Elliptic curves: Diophantine analysis
, volume 231 of
Grundlehren der Mathematischen Wissenschaften
.
Springer-Verlag,
Berlin, 1978.
[69] S. Lang.
Abelian varieties
. Springer-Verlag, New York, 1983. Reprint
of the 1959 original.
[70] S. Lang.
Elliptic functions
, volume 112 of
Graduate Texts in Mathemat-
ics
. Springer-Verlag, New York, second edition, 1987. With an appendix
by J. Tate.
[71] S. Lang.
Algebra
, volume 211 of
Graduate Texts in Mathematics
.
Springer-Verlag, New York, third edition, 2002.
[72] H. Lange and W. Ruppert. Addition laws on elliptic curves in arbitrary
characteristics.
J. Algebra
, 107(1):106-116, 1987.
[73] G.-J. Lay and H. G. Zimmer. Constructing elliptic curves with given
group order over large finite fields. In
Algorithmic number theory
(Ithaca, NY, 1994)
, volume 877 of
Lecture Notes in Comput. Sci.
, pages
250-263. Springer-Verlag, Berlin, 1994.
[74] H. W. Lenstra, Jr. Elliptic curves and number-theoretic algorithms. In
Proceedings of the International Congress of Mathematicians, Vol. 1,
2 (Berkeley, Calif., 1986)
, pages 99-120, Providence, RI, 1987. Amer.
Math. Soc.
[75] H. W. Lenstra, Jr. Factoring integers with elliptic curves.
Ann. of Math.
(2)
, 126(3):649-673, 1987.
[76] E. Liverance.
Heights of Heegner points in a family of elliptic curves
.
PhD thesis, Univ. of Maryland, 1993.
[77] B. Mazur. Rational isogenies of prime degree (with an appendix by D.
Goldfeld).
Invent. Math.
, 44(2):129-162, 1978.
[78] H. McKean and V. Moll.
Elliptic curves. Function theory, geometry,
arithmetic
. Cambridge University Press, Cambridge, 1997.
[79] A. Menezes and M. Qu. Analysis of the Weil descent attack of Gaudry,
Hess and Smart. In
Topics in cryptology—CT-RSA 2001 (San Fran-
cisco, CA)
, volume 2020 of
Lecture Notes in Comput. Sci.
, pages 308-
318. Springer-Verlag, Berlin, 2001.
[80] A. J. Menezes, T. Okamoto, and S. A. Vanstone. Reducing elliptic curve
logarithms to logarithms in a finite field.
IEEE Trans. Inform. Theory
,
39(5):1639-1646, 1993.
[81] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone.
Handbook of
applied cryptography
. CRC Press Series on Discrete Mathematics and
its Applications. CRC Press, Boca Raton, FL, 1997. With a foreword
by R. L. Rivest.
Search WWH ::
Custom Search