References
- Pro. of 28th annual ACM Symposium on Theory of Computing Generating hard instances of lattice problems Ajtai, M.
- IEEE Transactions on Information Theory v.IT-22 New directions in cryptography Diffie, W.;Hellman, M.E.
- IEEE Trans. Information Theory v.31 A public key cryptosystem and a signature scheme based on discrete logarithms El-Gamal, T.
- 현대암호악 ETRI
- Electronic Colloquium on Computational Complexity Public-key cryptosystems from lattice reduction problems Goldreich, O.;Goldwasser, S.;Halevi, S.
- A Course in Number Theory and Cryptography Koblitz, N.
- Mathematics of Computation v.48 Elliptic curve cryptosystem Koblitz, N.
- Finite Fields Lidl, R.;Niederreiter, H.
- Elliptic curve public key cryptosystems Menezes, A.
- Communications of the ACM v.21 no.2 A method for obtaining digital signatures and public-key cryptosystems Rivest;Shamir;Adleman
- Elementary Number Theory and its Applications Rosen, K.H.