1S.Hoory,N.Linial,and A.Wigderson.Expander graphs and their applications.BullAmer.Math.Soc.,43:439-561,2006.
2W.Diffie..M.E Heilman.New Directions in Cryptography.IEEE Transactions on Information Theory.Vol.IT-22.no.6.pp.644-654.1976.
3C.E.Shannon.Communication theory of secret system.Bell Syst.T ech.J.1949.
4D.Boneh and M.Franklin.Identity based encryption from t he Weil pairing.CRYPTO 2001,LNCS 2139,pp.213-229,Springe r-Veriag Berlin Heidelberg,2001.
5F.Morain and J.Olivos.Speeding up the computations on a n elliptic curve using addition-subtraction chains.Theoretical Info rmatics and Applications,24,531-543,1990.
6R.Schoof Elliptic curves over finite field and the computa tion of square roots mod p.Mathematics of Computation,1985.
7A.Atkin and F.Morain.Elliptic curves and primality provi ng Mathematics of Computation.1993.
8R Schoof.Counting Points on Elliptic Curves over Finit e FieldsJoumal of Theorie des Nombres de Bordeaux,1995.
9IEEE 1363.Standard Specifications for Public Key Crypto graphy.IEEE,2000.