참고문헌
- A. Weng, A low-memory algorithm for point counting on Picard curves, Designs, Codes and Cryptography 38 (2006), 383-393. https://doi.org/10.1007/s10623-005-1598-y
- M. Bauer, E. Teske and A. Weng, Point counting on Picard curves in large characteristic, Math. Comp. 74 (2005), 1983-2005. https://doi.org/10.1090/S0025-5718-05-01758-8
- K. Koike and A. Weng, Construction of CM Picard curves, Math. Comp. 74 (2005), 499-518.
- S. Flon and R. Oyono, Fast arithmetic on Jacobians of Picard curves, LNCS 2947 (2004), Springer-Verlag, 55-68.
- J. E-Sarlabous, J. P. Cherdieu, E. R-Barreiro and R.-P. Holzapfel, The emergence of Picard Jacobians in cryptography, Fourth Italian-Latin American Conference on Applied and Industrial Mathematics (2001), 266-275.
- P. Gaudry and S. M. Paulus, and N. Smart, Arithmetic on superelliptic curves, Math. Comp. 71 (231) (2002), 393-405.
- P. Gaudry and N. Gurel, An extension of Kedlaya's point counting algorithm to superelliptic curves, Advances in Cryptology-ASIACRYPT 2001, LNCS 2248 (2001), Springer-Verlag, 480-494.
- P. Gaudry and R. Harley, Counting points on hyperelliptic curves over finite fields, ANTS-IV, W. Bosma ed., LNCS 1838 (2000), Springer-Verlag, 297-312.
- P. Gaudry and E. Schost, A low-memory parallel version of Matsuo, Chao and Tsujii's algorithm, Proceedings of Algorithm Number Theory Symposium-ANTS VI, LNCS 3076, Springer-Verlag, 208-222.
- I. Blake, G. Seroussi and N. Smart, Elliptic curves in cryptography, London Math. Soc. Lecture Note Series 265 (1999).
- T. Satoh, The canonical lift of an ordinary elliptic curve over a prime field and its point counting, Journal of the Ramanujan Mathematical Society 15 (2000), 247-270.
- J. Estrada Sarlabous, On the Jacobian varieties of Picard curves defined over fields of characteristic p > 0, Math. Nachr. 152 (1991), 392-340.
- K. Kedlaya, Counting points on hyperelliptic curves using Monsky-Washnitzer cohomology, Journal of the Ramanujan Mathematical Society 16 (2001), 323-338.
- N. Koblitz, Hyperelliptic curve cryptosystems, J. Cryptology 1 (1989), 139-150. https://doi.org/10.1007/BF02252872
- N. Koblitz, Elliptic curve cryptosystems, Math. Comp. 48 (1987), 203-209. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- V. Miller, Uses of elliptic curves in cryptography, Advances in Cryptology: Crypto'85, LNCS 218 (1986), Spinger-Verlag, 417-426.
- R. Schoof, Elliptic curves over finite fields and the computation of square roots mod p, Math. Comp. 44 (1985), 483-494.
- Yu. I. Manin, The Hasse-Witt matrix of an algebraic curve, AMS Trans. Ser. 2 45 (1965), 245-264.