|
[1]FIDO. https://fidoalliance.org/ 2016.06.27 [2]U2F. https://fidoalliance.org/specifications/download/ 2016.06.27 [3]Elliptic Curve Digital Signature Algorithm - Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm 2016.06.27 [4]Docker https://www.docker.com/ 2016.06.27 [5]Google https://www.google.com 2016.06.27 [6]Dropbox https://www.dropbox.com/ 2016.06.27 [7]Elliptic Curve Digital Signature Verification Algorithm - Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm 2016.06.27 [8]Peter L. Montgomery. Speeding the Pollard and Elliptic Curve Methods of Factorization. Mathematics of Computation, Volume 48, Issue 177 (Jan., 1987), 234-264 [9]Michael Hutter, Marc Joye, and Yannick Sierra. Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representatio. Progress in Cryptology − AFRICACRYPT 2011, vol. 6737 of Lecture Notes in Computer Science, pp. 170–187, Springer, 2011. [10]Jmeter http://jmeter.apache.org/ 2016.06.27 [11]Apache http://www.apache.org/ 2016.06.27 [12]Google Compute Engine https://cloud.google.com/compute/ 2016.06.27
|