4Guo P,Su L P,Ning L J,et al.Hybrid encryption algorithms in cloud computing[J].Information Technology Journal,2013,12(14):3015-3019.
5Lu Xianhui,Li Bao,Jia Dingding.Related-key security for hybrid encryption[J].Lecture Notes in Computer Science,2014,8783:19-32.
6Potgieter M J,Dyk B J V.Two hardware implementations of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field[C]//IEEE AFRICON,Africon Conference in Africa.Piscataway,N J:IEEE Press,2002,1:187-192.