论文部分内容阅读
[1]Miller V., Uses of elliptic curves in cryptography, Advances in Cryptology, Proceedings of Crypto′85, 1985:417-426[2]Agnew G.B., Mullin R.C., An implementation of elliptic curve cryptosystems over F2155, IEEE Journal on SAC, 1993, 11(5):804-813[3]Gordo