LAI Zhongxi ZHANG Zhanjun TAO Dongya. Algorithm for directly computing 7P elliptic curves and its application[J]. Journal of Computer Applications, 2013, 33(07): 1870-1874.
[1]赖忠喜,陶东娅.一种基于半点运算与双基表示的双标量乘算法[J].计算机应用与软件,2012,29(9):293-295.[2]刘连浩,申勇.椭圆曲线密码体制中标量乘法的快速算法[J].计算机应用研究,2009,26(3):1104-1107.[3]洪银芳,桂丰,丁勇.基于半点和多基表示的标量乘法扩展算法[J].计算机工程,2011,37(4):163-165.[4]DOCHE C, IMBERT L. Extended double-base number system with applications to elliptic curve cryptography [C]// Proceedings of the 7th International Conference on Cryptology, LNCS 4329. Berlin: Springer-Verlag, 2006: 335-348.[5]CIET M, JOYE M, LAUTER K, et al. Trading inversions for multiplications in elliptic curve cryptography [J]. Designs Codes and Cryptography,2006, 39(2):189-206.[6]MISHRA P K, DIMITROV V. Efficient quintuple formulas for elliptic curves and efficient scalar multiplication using multibase number representation [C]// Proceedings of the 10th Information Security Conference. Berlin: Springer-Verlag, 2007:390-406. [7]PUROHIT G N, RAWAT S A. Fast scalar multiplication in ECC using the multi base number system [J]. International Journal of Computer Science Issues, 2011, 8(1): 131-137.[8]邓维勇.椭圆曲线密码体制中标量乘法研究[D].昆明:昆明理工大学,2012.[9]HANKERSO D, MENEZES A., VANSTONE S. Guide to elliptic curve cryptography [M]. Berlin: Springer-Verlag, 2004: 76-81.[10]殷新春,赵荣,侯红详,等.基于折半运算的快速双基数标量乘算法[J].计算机应用,2009,29(5):1285-1288.[11]许凯平,郑洪源,刘锦峰,等.椭圆曲线密码体制中快速标量乘方法研究[J].计算机工程与应用,2011,47(15):112-115.[12]WONG K W, LEE E C W, CHENG L M, et al. Fast elliptic scalar multiplication using new double-base chain and point halving [J]. Applied Mathematics and Computation, 2006, 183(2): 1000-1007.[13]DIMITROV V, IMVERT L, MISHRA P K. Efficient and secure elliptic curve point multiplication using double base chain [C]// Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 3788. Berlin: Springer-Verlag, 2005: 59-78.[14]PUROHIT G N, RAWAT S A, KUMAR M. Elliptic curve point multiplication using MBNR and point halving [J]. International Journal of Advanced Networking and Applications, 2012, 3(5): 1329-1337.