Schnorr, "Efficient Identification and Signatures for Smart Cards", Advances in Cryptology-Crypto '89, pp. 239-251. |
Brickell et al, "An Interactive Identification Scheme Based on Discrete Logarithms and Factoring", Journal of Cryptology, pp. 29-39. |
Diffie et al, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654. |
Miller, "Use of Elliptic Curves in Cryptography", Advances in Cryptology-Crypto '85, pp. 417-426, New York, 1986. |
Agnew et al, "Arithmetic Operations in GF(2.sup.m)", Journal of Cryptology, pp. 3-13, 1993. |
Rivest et al, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, 21(2), pp. 120-126. |
Brickell et al, "Fast Exponentiation with Precomputation: Algorithms and Lower Bounds", Advances in Cryptology-Eurocrypt '92, pp. 1-24. |
Odlyzko, "Discrete Logarithms in Finite Fields, and Their Cryptographic Significance", Advances in Cryptology-Eurocrypt '84, pp. 1-90, Berlin, 1984. |