Voir la notice de l'article provenant de la source Biblioteca Digitale Italiana di Matematica
@article{RASFM_2019_4_86_1_a2, author = {Corbo Esposito, Antonio and Tirelli, Cristian}, title = {A review about public cryptography protocols based on {RSA} or elliptic curves}, journal = {Rendiconto della Accademia delle scienze fisiche e matematiche}, pages = {123--146}, publisher = {mathdoc}, volume = {Ser. 4, 86}, number = {1}, year = {2019}, zbl = {1244.94031}, mrnumber = {2590642}, language = {en}, url = {http://geodesic.mathdoc.fr/item/RASFM_2019_4_86_1_a2/} }
TY - JOUR AU - Corbo Esposito, Antonio AU - Tirelli, Cristian TI - A review about public cryptography protocols based on RSA or elliptic curves JO - Rendiconto della Accademia delle scienze fisiche e matematiche PY - 2019 SP - 123 EP - 146 VL - 86 IS - 1 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/RASFM_2019_4_86_1_a2/ LA - en ID - RASFM_2019_4_86_1_a2 ER -
%0 Journal Article %A Corbo Esposito, Antonio %A Tirelli, Cristian %T A review about public cryptography protocols based on RSA or elliptic curves %J Rendiconto della Accademia delle scienze fisiche e matematiche %D 2019 %P 123-146 %V 86 %N 1 %I mathdoc %U http://geodesic.mathdoc.fr/item/RASFM_2019_4_86_1_a2/ %G en %F RASFM_2019_4_86_1_a2
Corbo Esposito, Antonio; Tirelli, Cristian. A review about public cryptography protocols based on RSA or elliptic curves. Rendiconto della Accademia delle scienze fisiche e matematiche, Série 4, Tome 86 (2019) no. 1, pp. 123-146. http://geodesic.mathdoc.fr/item/RASFM_2019_4_86_1_a2/
Post-Quantum Cryptography. Springer, pp.1-32 | DOI | MR
, , (2009)Group Theory in Cryptography. Department of Mathematics, Royal Holloway, University of London Egham, Surrey TW20 0EX, United Kingdom, pp. 2-6 | MR | Zbl
, , (2010)Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman and Hall/CRC, pp. 19-35, 268-285, 591-607 | MR | Zbl
, , , , , , (2005)Elliptic Curve Cryptography: A gentle introduction http://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction
(2015)Guide to Elliptic Curve Cryptography, Springer-Verlag, pp. 76-83 | DOI | MR | Zbl
, , (2004)Algebraic Aspects of Cryptography. Springer (Corrected Second Printing 1999), pp. 18-21, 133-136 | DOI | MR
(1998),Finite Fields for Computer Scientists and Engineers. Springer, pp. 3-28 | DOI | MR
(1979)Breaking RSA Encryption with a Quantum Computer: Shors' Factoring Algorithm, Cornell University, Physics 481-681 Lecture Notes
(March 28, 2006).Applied Cryptography. John Wiley & Sons, pp. 238-241, 233-263 | Zbl
(1996),Algorithms for quantum computation: Discrete logarithms and factoring, Proc. 35th Annu. Symp. Foundations of Computer Science, pp. 124-134. | DOI | MR
(1994)The Arithmetic of Elliptic Curves. Graduate Texts in Mathematics, Springer-Verlag, pp. 137-139 | DOI | MR
(1986).