[1] Koblitz N. A Course in Number Theory and Cryptography[M]. Heidelberg: Springer-Verlag, 1994.
[2] Miller V. Uses of Elliptic Curves in Cryptography[C]//Advances in Cryptology CRYPTO'85, Lecture Notes in Computer Science. Heidelberg: Springer, 1986: 417-426.
[3] 丁勇. 一种用椭圆曲线密码构建的传感网络密钥管理方案[J]. 西安电子科技大学学报, 2008, 35(4): 739-742.
Ding Yong. Key Management Scheme for WSN Using ECC[J]. Journal of Xidian University, , 2008, 35(4): 739-742.
[4] Namal S, Georgantas K, Gurtov A. Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography[C]//IEEE Wireless Communications and Networking Conference. Piscataway: IEEE, 2013: 1830-1835.
[5] Kodali R K, Budwal H S. High Performance Scalar Multiplication for ECC[C]//International Conference on Computer Communication and Informatics. Piscataway: IEEE, 2013: 1-4.
[6] Lopez J, Dahab R. Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)[C]//Lecture Notes In Computer Science: 1556. Heidelberg: Springer, 1988: 201-212.
[7] Lu C Y, Jen S M, Laih C S. A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication[J]. IEEE Transactions on Computers, 2013, 62(3): 428-438.
[8] Lopez J, Dahab R. Fast Multiplication on Elliptic Curves over GF (2m) without Pre Computation[C]//Workshop on Cryptographic Hardware and Embedded Systems. Heidelberg: Springer, 1999: 316-327.
[9] Certicom Research. Standards for Efficient Cryptography[S]. SEC 2: Recommended Elliptic Curve Domain Parameters, 2000. |