|
[1] Jiun-Ming Chen, Square-free Component Q 8 in TTM Cryptosystem, preprint. [2] J.M. Chen, and B.Y. Yang, Tame Trnsformation Signatures With Topsy-Turvy Hashes.Proc. IWAP2002, pages 93-100. [3] Chun-Yen Chou, D. J. Guan, and Jiun-Ming Chen, A Systematic Construction of a Q 2 k -module in TTM, Communications in Algebra, 30(2), pages 551-562 (2002). [4] Chun-Yen Chou and D. J. Guan, Square-free Q 4 ; Q 6 and Q 8 modules in TTM, preprint [5] Yuh-Hua Hu, Lih-Chung Wang, Jiun-ming Chen, Feipei Lai, and Chun Yen Chou, A Performance Report and Security Analysis of a fast TTM implementation, preprint. [6] T. Moh, A Public Key System With Signature And Master Key Functions, Communications in Algebra, 27(5), 2207-2222 (1999). [7] E.D. Win, S. Mister, B. Preneel, and M. Wiener. On the Performance of Signature Schemes Based on Elliptic Curves. Algorithmic Number 33 Theory Symposium III, LNCS 1423, J.P. Buhler, Ed., Springer-Verlag, 1998, pp. 252-266 [8] N. Koblitz, A Course in Number Theory and Cryptography, 2nd edition,Springer-Verlag, 1994. [9] D. Johnson, A. Menezes, and S. Vanstone. The Elliptic Curve Digital Signature Algorithm, ANSI X9.62 and FIPS 186-2, 1998. [10] Cristof Paar, A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Fields, IEEE Transactions on Computers, Vol. 45, No. 7, July 1996. [11] J.M. Chen, and B.Y. Yang, On the Secyrity and E鬣iency of TTS Signature Scheme, submitted. [12] N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, Vol. 48, No. 177, 1987, pp.203-209. [13] V.S. Miller, Use of elliptic curves in cryptography, Advances in Cryptology - Proceedings of CRYPTO85, Springer Verlag Lecture Notes in Computer Science 218, pages 417-426, 1986. [14] N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, No, 48, 1987, pp. 203-209.
|