D. Coppersmith, "The Real Reason For Rivest's Phenomenon", Advances in Cryptology--CRYPTO '85, Spring-Verlag, Lecture Notes in Computer Science, vol. 218, pp. 535-536. |
D. Coppersmith, "Another Birthday Attack", Advances in Cryptology--CRYPTO '85, Springer-Verlag, Lecture Notes in Computer Science, vol. 218, pp. 14-17. |
J. M. Pollard, "A Monte Carlo Method for Factorization", BIT, 15, pp. 331-334 (1975). |
C. H. Meyer, et al., Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, Inc., NY, N.Y., pp. 517-577 (1982). |
R. L. Rivest, et al., "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", Communications of the ACM, 21, No. 2, pp. 120-126 (1978). |
W. Diffie, et al., "New Directions in Cryptography", IEEE Trans. on Information Theory, IT-22, No. 6, pp. 644-654 (1976). |