參考文獻
[1]ANSI X9.38, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA).(1999).
[2]ANSIX9.63-2001, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. Working Draft, May 8.(2001).
[3]Abdalla, M., Shavitt, Y., and Wool, A., “Key management for restricted multicast using broadcast encryption”, IEEE/ACM Transactions on Networking (TON), Volume 8, Issue 4, pp. 443-454.(2000).
[4]Advanced Encryption Standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.(2001).
[5]Certicom Corporation, The Basics of ECC [Online], Available: http://www.certicom.com/index.php?action=res,ecc_faq.(2006).
[6]C. C. Lu and S. Y. Tseng, “Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter,” in Proc. Application-Specific Syst., Architectures Processors, Jul, pp. 277–285.(2002)
[7]Diffie, W., and Hellman, M., “New directions in cryptography.” IEEE Trans. Inf. Theory IT-22(6), pp. 644-654.(1976).
[8]Diffie, W., and Hellman, M. E., “Privacy and Authentication: An Introduction to Cryptography.” Proceedings of the IEEE, Vol. 67, No. 3, pp. 644-654.(1976).
[9]D. Hankerson, A. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer.(2003).
[10]ISO/IEC 15946-4, Information Technology – Security Techniques – Cryptographic Techniques Based on Elliptic Curves – Part 4: Digital signatures giving message recovery.(2004).
[11]John Ayoade, " Security implications in RFID and authentication processing framework." 25 Oct. pp. 207 – 212.(2006).
[12]J. Daemen and V. Rijmen, “AES Proposal: Rijndael,” AES Algorithm Submission.(1999).
[13]L. Washington. Elliptic curves. Number theory and Cryptography. Chapmanand Hall.(2003).
[14]M. Bednara, M. Daldrup, J. von zur Gathen, J. Shokrollahi, and J. Teich, "Reconfigurable Implementation of Elliptic Curve Crypto Algorithms," Proc. IEEE International Parallel and Distributed Processing Symposium, pp. 157-164.(2002).
[15]MIC-AISP情報顧問服務網站,http://mic.iii.org.tw/intelligence/
[16]NIST FIPS PUB 197, “Announcing the Advanced Encryption Standard (AES),”National Institute of Standard and Technology, U. S. Department of Commerce.(2001).
[17]N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, Vol. 48, No. 17, pp. 203-209.(1987).
[18]Rivest, R. L., Shamir, A., and Adleman, L., ”A method of obtaining Digital Signatures and Public-key Cryptosystems.” Communications of the ACM, Vol.21, No.2, pp. 120~126.(1978).
[19]R. C. C. Cheung, N. J. Telle, W. Luk, and P. Y. K. Cheung, "Customizable Elliptic Curve Cryptosystems," IEEE Trans. Very Large Scale Integration Systems, vol. 13, pp. 1048-1059, Sept.(2005).
[20]Viktor Fischer, Milos Drutarovsky, Pawel Chodowiec, and Francois Gramain, “InvMixcolumn Decomposition and Multilevel Resource Sharing in AES Implementations”, in IEEE Transactions on very large scale integration (VLSI) systems, vol.13, NO.8, August, pp.989-992.(2005).
[21]V.S. Miller., “Use of elliptic curves in cryptography,” Advances in Cryptology: Crypto’85, Springer-Verlag, pp. 417-426.(1986).
[22]Yu-Ping Tsou, " Building a Remote Supervisory Control Network System for Smart Home Applications." 8-11 Oct. pp. 1826 - 1830.(2006).
[23]王偲穎,「動態會議金鑰分配機制之研究」,世新大學資訊管理研究所,(2004)。
[24]台灣電腦網路危機處理暨協調中心,(TWCERT/CC),http://www.cert.org.tw/
[25]李澄興、林祺政,「電子商務概要」,美商麥格羅.希爾,(2000)。
[26]余千智,「電子商務總論」,智勝出版社,(1999)。
[27]沈淵源,「近代密碼學序曲」,東海大學數學系教授。
[28]周碧欣,「第三代行動通訊認證機制之研究」,世新大學資訊管理研究所,(2005)。
[29]周智禾,「A Study of Efficient Algorithms for Speeding up Elliptic Curve Cryptosystems in Mobile Environments」,大葉大學資訊管理研究所,(2000)。
[30]孟子元,「以橢圓曲線密碼學為基礎之行動商務安全支付協定」,長庚大學資訊管理研究所,(2003)。
[31]吳明翰,「行動網路下之使用者認證機制研究」,世新大學資訊管理研究所,(2006)。
[32]翁木龍,「Linux 環境下以AES 及SHA-256 強化VPN 的設計與實現」,國立高雄第一科技大學資訊管理系,第十三屆國際資訊管理學術研討會。
[33]華靜萱,「無線感測式之旱災預測模式與監測通報系統之研究與製作」,屏東科技大學資訊管理系,(2005)。
[34]許有賢,「第三方物流中心資訊分享績效評估之研究---以國內第三方物流業者為例」,大葉大學資訊管理系研究所,(2002)。
[35]陳宗保,「行動電子商務環境下安全協定之研究」,大葉大學資訊管理研究所碩士論文,(2001)。[36]黃國瑋,「結合無線通訊技術發展智慧型遠距居家照護系統之研究」,長庚大學資訊管理研究所,(2005)。
[37]陳毅,林柏翰,「Chaotic stream ciphers using logistic map」,台灣大學物理研究所,NCS 全國計算機會議,(2001)。
[38]張真誠,「電腦密碼學與資訊安全」,松崗電腦圖書公司,第3版,(1997)。
[39]張瑗玲,「捍衛網際網路的商機」,松崗圖書資料公司,(1997)
[40]楊中皇,「橢圓曲線密碼系統軟體實現技術之探討」,國立高雄師範大學資訊教育研究所,(2005)。
[41]賴溪松、韓亮、張真誠,「近代密碼學及其應用」,松崗圖書資料公司,(1999)。