Use of Elliptic Curves in Cryptography
Top Cited Papers
- 1 December 2000
- book chapter
- Published by Springer Nature
- p. 417-426
- https://doi.org/10.1007/3-540-39799-x_31
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Théorème de Brun-Titchmarsh; application au théorème de FermatInventiones Mathematicae, 1985
- On the Equation Y 2 = X(X 2 + p)Mathematics of Computation, 1984
- Lower bound for the canonical height on elliptic curvesDuke Mathematical Journal, 1981
- Monte Carlo Methods for Index Computation (mod p)Mathematics of Computation, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- On the difference of the Weil height and the N ron-Tate heightMathematische Zeitschrift, 1976
- Diophantine Equations with Special Reference To Elliptic CurvesJournal of the London Mathematical Society, 1966
- Notes on elliptic curves. II.Journal für die reine und angewandte Mathematik (Crelles Journal), 1965
- Notes on elliptic curves. I.Journal für die reine und angewandte Mathematik (Crelles Journal), 1963