Menezes et al, Handbook of Applied Cryptography, Oct. 17, 1996, pp. 172, 188, 397, 398, 404, 405, 494, 497, and 498.* |
I'Anson, C. et al.: “Security Defects in CCITT Recommendation X.509—The Directory Authentication Framework” Computer Communication Review, vol. 20, No. 2, Apr. 20, 1990, pp. 30-34, XP 000133725 New York (US). |
Miyaji, A.: “Elliptic Curves Over Fp Suitable for Cryptosystems” Advances in Cryptology—AUCRYPT '92 Gold Coast, Queensland, Dec. 13-16, No. Conf. 3, Dec. 13, 1992, pp. 479-491, XP000470467 Berlin (DE). |
Pil Joong Lee: “Secure User Access Control for Public Networks” Advances in Cryptology—AUCRYPT '90, Sydney, Jan. 8-11, 1990, No. Conf. 1, Jan. 8, 1990, pp. 46-57, XP000145201 Berlin (DE). |