Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Blake I., Seroussi G., Smart N., Elliptic Curves in Cryptography, London Math. Soc. Lect. Notes, 265, Cambridge Univ. Press, Cambridge, 1999, 224 pp. | MR | Zbl
[2] van Oorschot P., Wiener M. J., “Parallel collision search with cryptanalytic applications”, J. Cryptology, 12:1 (1999), 1–28 | DOI | MR | Zbl
[3] Pollard J. M., “Theorems on factorization and primality testing”, Proc. Cambridge Phil. Soc., 76:3 (1974), 521–528 | DOI | MR | Zbl
[4] Pollard J. M., “Monte Carlo methods for index computation $\pmod p$”, Math. Comput., 32:143 (1978), 918–924 | MR | Zbl
[5] Shanks D., “Class number, a theory of factorization and genera”, 1969 Number Theory Institute, Proc. Symp. Pure Math., XX, 1971, 415–440 | DOI | MR | Zbl
[6] Teske E., “Square-root algorithms for the discrete logarithm problem (a survey)”, Publickey Cryptography and Computational Number Theory, Walter de Gruyter, Berlin etc., 2001, 283–301 | MR