[1] |
Koblitz N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48(48):203209.
|
[2] |
Miller V S.Use of elliptic curves in cryptography[J].Lecture Notes in Computer Science,1986,218(1):417426.
|
[3] |
Hankerson D. Guide to elliptic curve cryptography [M].Zhang Huanguo, translation. Beijing: Publishing House of Electronics Industry,2005.(in Chinese)
|
[4] |
Montgomery P.Speeding the pollard and elliptic curve methods of factorization[J].Mathematics of Computation,1987,48(48):243264.
|
[5] |
López J,Dahab R.Fast multiplication on elliptic curves over GF(2m) without precomputation[C]∥Proc of International Workshop Cryptographic Hardware and Embedded Systems,1999:316327.
|
[6] |
Akishita T.Fast simultaneous scalar multiplication on elliptic curve with Montgomery form[C]∥Proc of International Workshop on Selected Areas in Cryptograph,2001:97103.
|
[7] |
Chen Jun. A fair exchange protocol based on elliptic curve[J].Journal of Shandong University of Science and Technology (Natural Science),2014,33(6):103106.(in Chinese)
|
[8] |
Zhang Jianzhong, Ma Weifang. Blind proxy blind signature scheme on elliptic curve[J].Computer Engineering,2010,36(11):126127.(in Chinese)
|
[9] |
Zhou Keyuan. Digital signature scheme based on elliptic curve and factoring[J].Computer Science,2014,41(S1):366368.(in Chinese)
|
[10] |
Okeya K, Sakurai K. Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the ycoordinate on a Montgomeryform elliptic curve[C]∥Proc of the 3rd International Worshop on Cryptographic Hardware and Embeded Systems(CHES 2001),2001,2162:126141.
|
[11] |
Okeya K,Sakurai K.Elliptic curves with the Montgomeryform and their cryptographic applications[C]∥
|
|
Proc of the 3rd International Worshop on Practice and Theory in Public Key Cryptographic(PKC 2000),2000:238257.
|
[12] |
Doche C,Sutantyo D.Faster repeated doublings on binary elliptic curves[C]
|
|
∥
|
|
Proc of International Worshop on Selected Areas in Cryptographic(SAC 2013),2013:456470.
|
[13] |
ChevalierMames B,Ciet M,Joye M.Lowcost solutions for preventing simple sidechannel analysis:Sidechannel atomicity[J].IEEE Transactions on Computers,2004,53(6):760768.
|
[14] |
Cho S M,Seo S C,Kim T H,et al.Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis[J].Information Sciences,2013,245(10):304312.
|
[15] |
Bernstein D,Lange T.Analysis and optimization of ellipticcurve singlescalar multiplication[J].Contemporary Mathematics,2008,461(461):120.
|
[16] |
Chinese Commercial Cryptography Administration Office. Public key cryptographic algorithm SM2 based on elliptic curves[EB/OL].[20120321]. http://www.oscca.gov.cn/News/201204/News_1229.htm.(in Chinese)
|
[17] |
Li M,Miri A,Zhu D.Fast algorithm for converting ordinary elliptic curves into binary Edward form[J].International Journal of Digital Content Technology & Its Applic,2012,6(1):405412.
|
|
附中文参考文献:
|
[3] |
Hankerson D.椭圆曲线密码学导论[M].张焕国,译.北京:电子工业出版社,2005.
|
[7] |
陈俊.基于椭圆曲线的公平交换协议[J].山东科技大学学报(自然科学版),2014,33(6):103106.
|
[8] |
张建中,马伟芳.椭圆曲线上的盲代理盲签名方案[J].计算机工程,2010,36(11):126127.
|
[9] |
周克元.基于椭圆曲线和因子分解双难题的数字签名方案[J].计算机科学,2014,41(S1):366368.
|
[16] |
国家密码管理局.SM2椭圆曲线公钥密码算法[EB/OL].[20101217].http://www.oscca.gov.cn/News/201012/News_1197.htm.
|