2Koblitz N. Elliptic curve cryptosystems [ J ]. Mathematics of Computation, 1987, 48(177) : 203 - 209.
3Miller V. Uses of elliptic curves in crytography [ C ]//Ad- vances in Cryptology - CRYPTO85, LNCS218. Santa Bar- bara, Calif: Springer-Verlag, 1986:417-426.