Koyama et. al. Elliptical Curve Cryptosystems and Their Applications, IEICE Trans INF & Syst. E75-D pp. 50-57, Jan. 1992.* |
Bruce Schneier, Applied Crytography, 2e, John Wiley pp. 70-73, Oct. 1995.* |
IBM SecureWay key recovery technology, http://www.ibm.com/security/html/prkeyrec.html, Jan. 27, 1997.* |
IBM Comparison to Alternatives, http://www˜4.ibm.com/software/security/keywords/library/whitepapers/keyrec3.html, Jan. 27, 1997.* |
SecureWay Key Recovery technology, http://www˜4.ibm.com/software/security/keyworks/library/whitepapers/keyrec.html, Jan. 27, 1997.* |
IBM SecureWay key recovery technology, http://www˜4.ibm.com/software/security/keyworks/library/whitepapers/keyrec2.html, Jan. 27, 1997.* |
BIT, Lecture, Feb. 1996, vol. 28, No. 2. |
“Fair Cryptosystems” by S. Micali, Aug. 11, 1994. |