Page 331 - Hardware Implementation of Finite-Field Arithmetic
P. 331

An Example of Application—Elliptic Curve Cryptography        311



          10.7 References
               [ARS78] L. M. Adleman, R. L. Rivest, and A. Shamir. “A Method for Obtaining
                  Digital Signatures and Public-key Cryptosystems.” Communications of the ACM,
                  21, pp. 120–126, 1978.
               [BSS99] I. F. Blake, G. Seroussi, and N. P. Smart. Elliptic Curves in Cryptography.
                  Cambridge University Press, Cambridge, 1999.
               [ElG85] T. ElGamal. “A Subexponential-time Algorithm for Computing Discrete
                                   2
                  Logarithms over GF(p ).” IEEE Transactions on Information Theory, IT-31,
                  pp. 473–481, 1985.
               [HMV04] D. Hankerson, A. Menezes, and S. Vanstone.  Guide to Elliptic Curve
                  Cryptography. Springer, New York, 2004.
               [LD99] J. López and R. Dahab. “Improved Algorithm for Elliptic Curve Arithmetic
                       n
                  in GF(2 ).” Lecture Notes in Computer Science, 1556, pp. 201–212, Springer-Verlag,
                  1999.
               [Sol00] J. Solinas. “Efficient Arithmetic on Koblitz Curves.” Designs, Codes and
                  Cryptography, no. 19, pp. 195–249, 2000.
   326   327   328   329   330   331   332   333   334   335   336