6C.E.Shannon.Communication theory of secret system.Bell Syst.T ech.J.1949. 被引量:1
7D.Boneh and M.Franklin.Identity based encryption from t he Weil pairing.CRYPTO 2001,LNCS 2139,pp.213-229,Springe r-Veriag Berlin Heidelberg,2001. 被引量:1
8F.Morain and J.Olivos.Speeding up the computations on a n elliptic curve using addition-subtraction chains.Theoretical Info rmatics and Applications,24,531-543,1990. 被引量:1
9R.Schoof Elliptic curves over finite field and the computa tion of square roots mod p.Mathematics of Computation,1985. 被引量:1
10A.Atkin and F.Morain.Elliptic curves and primality provi ng Mathematics of Computation.1993. 被引量:1