[1] WANG C. A research on the securities of elliptic curve cryptosystems [D]. Wuhan: Wuhan University, 2002:46-52.(汪朝晖.椭圆曲线密码的安全性研究[D].武汉:武汉大学, 2002:46-52.) [2] WANG Z, CHEN J, TU H, et al. Efficient implementation of elliptic curve cryptosystem over prime fields [J]. Journal of Wuhan University: Natural Science Edition, 2004,50(3):335-338. (汪朝晖,陈建华,涂航,等. 素域上椭圆曲线密码的高效实现[J]. 武汉大学学报:理学版, 2004,50(3):335-338.) [3] SHEN C, ZHANG H, FENG D, et al. Overview of information security [J]. Science in China, Series E: Information Science, 2007, 37(2): 129-150.(沈昌祥, 张焕国, 冯登国, 等. 信息安全综述[J]. 中国科学, E辑:信息科学, 2007, 37(2): 129-150.) [4] BATINA L, BERNAORS S, PRENEEL B, et al. Hardware architectures for public key cryptography [J]. VLSI Journal, 2003, 34(12): 1-64. [5] BATINA S, PRENEEL L, VANDEWALLE B, et al. Hardware implementation of an elliptic curve processor over GF(p)[C]//ASAP 2003: Proceedings of the 14th IEEE International Conference on Application-Specific Systems, Architectures and Processors. Piscataway: IEEE Press, 2003:433-443. [6] ZHANG L, SHEN J, ZHAO L. Security enhanced elliptic curve cryptosystem approach [J]. Journal of Xi'an Jiaotong University, 2001, 35(10): 1038-1042. (张龙军, 沈钧毅, 赵霖. 椭圆曲线密码体制安全性研究[J]. 西安交通大学学报, 2001, 35(10): 1038-1042. [7] LIU F, ZHANG J. An algorithm of plaintext embedding in elliptic curve [J]. Journal of Jinan University: Natural Science, 2005, 19(4):333-334. (刘峰,张建中. 一种明文嵌入到椭圆曲线上的混合算法[J]. 济南大学学报:自然科学版, 2005,19(4):333-334.) [8] ZHANG J. Design and implementation of plaintext embedding in elliptic curve cryptosystem [J]. Journal of Zhengzhou University of Light Industry: Natural Science, 2009, 24(6):97-99. (张静. 椭圆曲线密码系统中明文嵌入算法的设计与实现[J]. 郑州轻工业学院学报:自然科学版, 2009, 24(6):97-99.) [9] LI G. Research on plaintext embedment in elliptic curves [J]. Journal of Jiangxi Normal University: Natural Sciences, 2007, 31(2):127-130. (李国敬. 椭圆曲线中明文嵌入问题研究[J]. 江西师范大学学报:自然科学版, 2007,31(2):127-130.) [10] HOU A, GAO B, XIN X. An improved algorithm and its implementation for the embedding of plaintext into elliptic curve [J]. Computer Application and Software, 2008, 25(7):58-59. (侯爱琴,高宝建,辛小龙.明文嵌入椭圆曲线的改进算法及实现[J].计算机应用与软件,2008,25(7):58-59.) [11] HANKERSON D, MENEZES A, VANSTONE S. Guide to elliptic curve cryptography [M]. ZHANG H. translated. Beijing: Publishing House of Electronics Industry, 2005:71-73. (HANKERSON D, MENEZES A, VANSTONE S. 椭圆曲线密码学导论[M]. 张焕国,译. 北京:电子工业出版社, 2005: 71-73.) [12] KOBLITTZ N. A course in number theory and cryptography [M]. 3rd ed. Berlin: Springer-Verlag,1994:79-180. [13] TONG W, ZHANG X, LI Z, et al. A hybrid cryptography algorithm for data concentrator communication message based on elliptic curve cryptography [J]. Automation of Electric Power Systems, 2014, 38(4):86-91.(佟为明,张希栋,李中伟,等. 基于椭圆曲线密码的数据集中器通信报文混合密码算法[J].电力系统自动化, 2014,38(4):86-91.) [14] STINSON D R. Cryptography theory and practice [M]. 3rd ed. FENG D, translated. Beijing: Publishing House of Electronics Industry, 2009:206-207. (STINSON D R.密码学原理与实践 [M]. 3版.冯登国, 译.北京:电子工业出版社, 2009:206-207.) |