[1]
C. E. Shannon. Communication Theory of Communication, Bell Syst Tech.J., Vol. 28, pp.656-715, (1949).
Google Scholar
[2]
W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Information Theory, 1976, 22, pp.644-654.
DOI: 10.1109/tit.1976.1055638
Google Scholar
[3]
R. L. Rivest, A. Shamir, and L. Aldleman. A menthod for obtaining digital signatures and public-key cryptosystems, Comm. of the ACM, 21(1978), 120-126.
DOI: 10.1145/359340.359342
Google Scholar
[4]
M. O. Rabin. Digital signatures and public-key functions as intractible as factorization. Technical report LCS/TR-212, MIT Labrary for Computer Science, (1979).
Google Scholar
[5]
T. ElGamal. A public-key cryptosystem and a signature based on discrete logarithms. IEEE Tansactions on Information Theory, 31(1985), 469-472.
DOI: 10.1109/tit.1985.1057074
Google Scholar
[6]
N. Koblitz. Ellipic curve cryptosystems. Mathematics of Computation, 48(1987)203-209.
Google Scholar
[7]
A. J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography, CRC Press, (1997).
Google Scholar
[8]
V. M¨oller. Use of ellipitic curvers in cryptography. In Adcances in Cryptology-Crypto'85, LNCS 218, pp.417-426. Springer-Verlag, (1986).
Google Scholar
[9]
L. M. Kohnfelder. Towards a Practical Public-key Cryptosystem. Bachelor's thesis, Department of Computer Science, Massachusetts Institute of Technology, Cambridge, MA (June 1978).
Google Scholar
[10]
M. Bellare and P. Rogaway, Minimizing the use of random oracles in authenticated encryption chemes, Information and Communications Security, Lecture Notes in Computer Science, vol. 1334 (1997), 1-16. 213.
DOI: 10.1007/bfb0028457
Google Scholar
[11]
ANSI X9. 63, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport using Elliptic Curve Cryptography, American National Standards Institute, 2001. 213, 214.
DOI: 10.1002/9781118482261.ch5
Google Scholar