References
- Daniel J. Bernstein, Tandja Lange, Faster addition and doubling on elliptic curves, In International Conference on the Theory and Application of Cryptology and Information Security, pp. 29-50. Springer, 2007.
- Daniel J. Bernstein, Tandja Lange, A Complete set of addition laws for incomplete Edwards curves, Journal of Number Theory, 131(5) pp.858-872, 2011. doi: 10.1016/j.jnt.2010.06.015
- Daniel J. Bernstein, Peter Birkner, Marc Joyce, Tandja Lange, Christiane Peters, Twisted Edwards curves, In International Conference on Cryptology in Africa, Springer, pp. 389-505, 2008.
- Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference Santa Barbara California USA August 19-23, Proceedings , pp. 213-229, (2001).
- N. Diarra, E. Fouotsa, An Encoding for the Theta Model of Elliptic Curves, Innovations and Interdisciplinary Solutions for Underserved Areas, vol. 249, pp. 224-235, (2019). doi: 10.1007/978-3-319-98878-8_21
- Harolds Edwards, A normal form for elliptic curves, Bulletin of the American Mathematical Society, 44(3) pp. 393-422, 2007. doi: 10.1090/S0273-0979-07-01153-6
- Diffie, W., Hellman, M.E., New directions in cryptography, IEEE Transactions on Information Theory, vol. 32, pp. 644-654, (1976). doi: 10.1109/TIT.1976.1055638
- E. Fouotsa, Parallelizing pairings on Hessian elliptic curves, Arab Journal of Mathematical Sciences, vol. 25:1, pp. 29-42, (2019). doi: 10.1016/j.ajmsc.2018.06.001
- El Gamal T, A public key cryptosystem and signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol. 31, pp. 473-496, (1985). doi: 10.1109/TIT.1985.1057075
- Neal Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol. 48, pp. 203-209, (1987).
- Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson, Twisted Edwards curves revisited, In International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp. 326-343, 2008.
- L. Hitt, G. McGuire, R. Moloney, Division polynomial for twisted curves, (2008). Link: http://arxi.org/abs/0809.2182.
- R. Moloney and G. McGuire, Two kinds of division polynomials for twisted Edwards curves, Applicable Algebra in Engineering, Communication and Computing, 22, pp. 321-345. Link: https://link.springer.com/article/10.1007/2Fs00200-011-0153-5
- Benot Libert, Jean-Jacques Quisquater, Identity Based Undeniable Signatures, Topics in Cryptology - CT-RSA 2004, The Cryptographers’ Track at the RSA Conference San Francisco CA USA February 23-27 Proceedings , pp. 112-125, (2004).
- E. Mehta, A. Solanki, Minimization of mean square error for improved euler elliptic curve secure hash cryptography for textual data, Journal of Information and Optimization Sciences, vol. 38:6, pp. 813-826, (2017). doi: 10.1080/02522667.2017.1372131
- Use of elliptic curves in cryptography, New directions in cryptography, Advances in Cryptology - CRYPTO’85, vol. 218, pp. 417-426, (1986).
- A. Nitaj, E. Fouotsa, A new attack on RSA and Demytko’s elliptic curve cryptosystem, Journal of Discrete Mathematical Sciences and Cryptography, vol. 22:3, pp. 391-409, (2019).
- R. Shipsey Elliptic divisibility sequences, Ph.D. Thesis. Goldsmith’s College University of London, (2000).
- K. Stange, Elliptic nets and elliptic curves, Algebra and Number Theory 2, vol. 5, pp. 197-229, (2011). doi: 10.2140/ant.2011.5.197
- Swart C. S. Elliptic curves and related sequences. Ph.D thesis, Royal Holloway and Bedford New college, University of London, (2003).
- M. Ward, Memoir on elliptic divisibility sequences, Amer. J. Math. vol. 31-74, pp. 70, (1948).
- L. C. Washington, Elliptic Curves Number Theory and Cryptography, University of Maryland.