4CAVALLAR S, et al. Factorization of a 512-bit RSA modulus[A]. Advances in Cryptology- Eurocrypt 2000[C].LNCS 1807,Springer-Verlag, 2000. 1-18. 被引量:1
5BONEH D. Twenty years of attacks on the RSA cryptosystem[J]. Notices of the American Mathematical Society, 1999, 46(2):203-213. 被引量:1
6DUSSEAND J R, KALISKI B. A cryptographic library for the Motorola DSP56000[A]. Advances in Cryptology-Eurocrypt 1990[C].LNCS 473, Springer-Verlag, 1991.230-244. 被引量:1
7KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987,48:203-209. 被引量:1
8MILLER V. Uses of elliptic curves in cryptography[A]. Advances in Cryptology-Crypto 1985[C].LNCS 218, Springer-Verlag,1986.417 -426. 被引量:1
9KOBLITZ N. Hyperelliptic cryptography[J]. Journal of Cryptology, 1989,1(3):139-150. 被引量:1
10CANTOR D G. Computing in the jacobian of a hyperelliptic curve[J]. Mathematics of Computation, 1987, 48(177): 95-101. 被引量:1