|
[1] Diffie H. and Hellman M. E., ”New Directions in Cryptography”, IEEE Transactions on Information eory,Vol.IT-22,No.6,pp644-654,November 1976. [2] Koblitz N., “Elliptic curve cryptosystems”, Mathematics of Computation,Vol.48,No.177,pp203-209,1987. [3] Chi-Chun Lo;Yu-Jen Chen, “A secure communication architecture for GSM networks”, Communications,Computers and Signal Processing,1999. [4] Miller V., “Uses of elliptic curves in cryptography”,Advances in Cryptology,CRYPTO’85,pp417-426,1985 [5] Chi-Sung Laih;Lein Harn;Chin- Chen Chang, “近代密碼學及其應用” 松崗電腦圖書資料股份有限公司 [6] R.Rivest,A.Shamir,and L.Adleman, “A method for obtaining digital signatures and public-key cryptosystem”, Comm.of ACM,Vol.21,pp. 120-126,1978 [7] William Stallings, “CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice”,SECOND EDITION,Prentice Hall International,Inc. [8] Jurisic,A.,and Menezes,A. “Elliptic curves and Crptography” Dr.Dobb’s Journal,April 1997. [9] J.Pollard, “Monte Carlo methods for index computation mod P”,Mathematics of Computation,32,pp 918-924,1978. [10] Botes,J.J.;Penzhorn,W.T., “Public-key cryptosystems based on elliptic curves” Communications and Signal Processing, 1993 . [11] Chi-Chun Lo;Yu-Jen Chen, “Secure communication mechanisms for GSM networks”, Consumer Electronics, IEEE Transactions on Published: Nov. 1999 [12] Al-Tawil,K;Akrami,A.;Youssef,H.;, “A new authentication protocol for GSM networks”,Local Computer Networks,1998. [13] http://csrc.nist.gov/encryption/aes. [14] R.Thomas;H.Gilbert;G.Mazziotto, “Influence of the Mobile station on the Performance of the Radio Mobile Cellular Network”, Proc. 3rd Nordic Seminar, Paper 9.4,Copenhagen,Danmark,Sept.1988. [15] Schoof par R., “Counting Points on Elliptic Curves over Finite Fields”,Journal de Theories des Nombres de Bordeaux,Vol.7,pp219-254,1995. [16] Schoof par R. “Elliptic curves over finits fields and the computation of square roots modp”, Mathmatics of Computation,vol 44,No 170 pp483-494,1985. [17] Chi-Chun Lo;Yu-Jen Chen, “Stream ciphers for GSM networks”, Communications, IEEE International Conference o Published :2000,Vol 1,pp 80-84,2000. [18] Gregory P. Pollini;Kathleen S. Meier-hellstern,; David J.Goodman, “Signaling Traffic Volume Generated by Mobile and Personal Communications”,IEEE Communications Magazine,pp60-65,June 1995. [19] Sutikno,S.;Surya, A.;Effendi,R., “An implementation of ElGamal elliptic curves cryptosystems”,Circuits and system,IEEE APCCAS,1998 [20] Koblitz N., “Algebraic Aspects of Crptography”, Springer.
|