1V.S. Miller. Use of Elliptic Curves in Cryptography[J]. Advances in Cryptology-Crypto'85,Lecture Notes in Computer Science, Springer-Verlag, 1985, (218) :417-426. 被引量:1
2Scott Vanstone. Responses to NIST' s Proposal[J]. Communication of the ASM (Communicated by John Anderson), 1992, 7(35):50-52. 被引量:1