Odlyzko, "Discrete Logarithms and Smooth Polynomials," Contemporary Mathematics, vol. 168:269-278, 1994. |
Montgomery, "Modular Multiplication Without Trial Division," Mathematics of Computation, vol. 44;519-521, Apr. 1985. |
Digital Signature Standard, Federal Information Processing Standards Publication 186, May 19, 1994. U.S. Department of Commerce. |
Bos, et al., "Addition Chain Heuristics," Lecture Notes in Computer Science, Advances in Cryptology-Crypto '89, 401-407. |
Brickell, et al., "Fast Exponentiation with Precomputation (Extended Abstract)", Advances in Cryptology--Eurocrypt '92, Workshop on the Theory and Application of Cryptographic Techniques, 201-207, May 1992. |
Sauerbrey, et al., Resource Requirements for the Application of Addition Chains in Modulo Exponentiation, Advances in Cryptology--Eurocrypt '92, Workshop on the Theory and . . ., 175-182, May 1992. |
Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology--Crypto '96, 16th Annual International Cryptology Conference, 105-113, Aug. 1996. |
Rivest, et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communication of the ACM, vol. 21: 120-126, Feb. 1978. |
Coppersmith, "Fast Evaluation of Logarithms in Fields of Characteristic Two," IEEE Transactions Information Theory, vol. IT-30:587-594, Jul. 1984. |
Diffie, et al., "New Directions in Cryptography," IEEE Transactions on Informaton Theory, vol. IT-22;644-654, Nov. 1976. |
van Oorschot, et al., "Parallel Collision Search With Application to Hash Functions and Discrete Logarithms" Bell-Northern Research, 210-218, Aug. 1994. |
Seminumerical Algorithms, vol. 2, The Art of Computer Programming, Second Edition. (index only). |