3W Diffie, M E Hellman. NEW Directions in Cryptography[J ]. IEEE Trans Informat Theory, 1976, IT-22:644- 654.
4Rivest R L,Shamir A,Adleman L. A Method for obtaining Digital Signatures and Public- key Cryptosystem[J]. Comm ACM,1978 ,:21 (2) : 120 - 126.
5L ElGamal. A Public Key Cryptosystem and Signature Scheme Base on Discrete Logarithm[J]. IEEE Transactions of information Theory, 1985,31 : 469 - 472.
6V Miller. Use of Elliptic Curves in Cryptography[A]. A M Odlyzko. Advances in Cryptology - Proceedings of CRYPTO 1986,volume 263 of Lecture Notes in Computer Science[C]. New york: Sorirger, 1986. 417 - 426.
8Joseph H Silberman. The Arithmetic of Elliptic Curves[ M]. New York: Springer- Verlag, 1986.46 - 61,130 - 136.
9T Satoh. The canonical lift of an ordinary elliptic curve over a finite field and its point counting[J ]. Rarnanujan Mathematical Society, 2000,15.247 - 270.
10M Fouquet,P Gaudry,R Harley. An extention Satoh' algorithm and its implementation[J]. Ramanujan Mathematical Society,2000,15:281 - 318.