References
Introduction to Cryptography. Berlin: Springer-Verlag, 2001.
New directions in cryptography." IEEE transactions on Information Theory 22, no. 6 (1976): 644-654. "
A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE transactions on Information Theory 31, no. 4 (1985): 469-472. "
The elliptic curve digital signature algorithm (ecdsa)." International journal of information security 1, no. 1 (2001): 36-63. "
Elliptic curve cryptosystems." Mathematics of computation 48, no. 177 (1987): 203-209. "
Algebraic aspects of cryptography . Springer, 1998.
Elliptic curve crypto systems." CryptoBytes 1, no. 2 (1995). "
Handbook of Applied Cryptography . CRC Press, 1996.
Use of elliptic curves in cryptography. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 1985.
An authenticated key exchange protocol in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 5 (2007): 697-705. "
A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126. "
Elliptic curves over finite fi elds and the computation of the square roots modulo p." Mathematics of Computation 44, no. 177 (1984): 483-494. "
On the hardware implementations of the sha-2 (256, 384, 512) hash functions In Proceedings of the 2003 International Symposium on Circuits and Systems. Bangkok, Thailand: ISCAS '03, 2003.
Elliptic curves: number theory and cryptography. CRC press, 2008.