参考文献
[1]Schmidt-Samoa K,Semay O,Takagi T.Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems[J].IEEE Transactions on Computers,2006,55(1):48-57.
[2]Birkner P,Thériault N.Faster Halvings in Genus 2[C]//Proceedings of International Workshop on Selected Areas in Cryptography.Berlin,Germany:Springer-Verlag,2008:1-17.
[3]Katagi M,Akishita T,Kitamura I,et al.Efficient Hyper-elliptic Curve Cryptosystems Using Theta Divisors[J].IEICE Transactions on Fundamentals of Electronics,Com-munications and Computer Sciences,2006,89(1):151-160.
[4]Feng Jun,Wang Xueming,Hong Sun.Efficiently Com-putable Endomorphism for Genus 3 Hyperelliptic Curve Cryptosystems[J].Information Processing Letters,2013,113(12):405-408.
[5]Park T J,Lee M K,Park K.Efficient Scalar Multi-plication in Hyperelliptic Curves Using a New Frobenius Expansion[C]//Proceedings of International Conference on Information Security and Cryptology.Berlin,Germany:Springer-
Verlag,2003:152-165.
[6]Iijima T,Matsuo K,Chao J,et al.Construction of Frobenius Maps of Twists Elliptic Curves and Its Application to Elliptic Scalar Multiplication[C]//Proceedings of Symposium on Cryptography and Information Security.[S.l.]:Institute
of Electronics,Information and Communication Engineers,2002:699-702.
[7]曹鸿钰,王鲲鹏.扭曲雅可比相交曲线上的斜-Frobenius 映射[J].计算机工程,2015,41(1):270-274.
[8]陆卫新,汪学明.超椭圆曲线上的 Ate 对变种及其计算的研究[J].计算机工程与设计,2014,35(5):1578-1582.
[9]Lange T.Koblitz Curve Cryptosystems[J].Finite Fields and Their Applications,2005,11(2):200-229.
[10]Chuengsatiansup C.Faster Elliptic Curve Arithmetic for Double-base Chain by Reordering Sequences of Field Operations[C]//Proceedings of IEEE International Symposium on Information Theory and Its Applications.Washington
D.C.,USA:IEEE Press,2012:411-445.
(下转第91页)
(上接第83页)
[11]Aranha D F,Faz-Hernández A,López J,et al.Faster Implementation of Scalar Multiplication on Koblitz Curves[C]//Proceedings of International Conference on Cryptology and Information Security in Latin
America.Berlin,Germany:Springer-Verlag,2012:177-193.
[12]Azarderakhsh R,Karabina K.A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms[J].IEEE Transactions on Computers,2014,63(10):2614-2619.
[13]Bos J W,Costello C,Miele A.Elliptic and Hyperelliptic Curves:A Practical Security Analysis[C]//Proceedings of International Workshop on Public Key Cryptography.Berlin,Germany:Springer-Verlag,2014:203-220.
[14]You L,Zeng J.Fast Scalar Multiplications on Hyperelliptic Curve Cryptosystems[J].Informatica,2010,34(2):227-236.
[15]Avanzi R M,Cohen H,Doche C,et al.Handbook of Elliptic and Hyperelliptic Curve Cryptography[M].New York,USA:CRC press,2010.
编辑刘冰 |