共 50 条
- [31] Computation of the unipotent Albanese map on elliptic and hyperelliptic curves [J]. Annales mathématiques du Québec, 2020, 44 : 201 - 259
- [34] The application of elliptic curves cryptography in embedded systems [J]. ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 527 - 530
- [35] GOOD AND BAD USES OF ELLIPTIC CURVES IN CRYPTOGRAPHY [J]. MOSCOW MATHEMATICAL JOURNAL, 2002, 2 (04) : 693 - 715
- [36] Rational groups of elliptic curves suitable for cryptography [J]. CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 69 - 80
- [39] Encryption Scheme Based on Hyperelliptic Curve Cryptography [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 491 - 506