Bruce Schneier, Applied Cryptography 2e, John Wiley, 1995.* |
Wayne Patterson, Mathematical Cryptology for Computer Scientists and Mathematician, Rowman & Littlefield, 1987.* |
Neal Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, 1987.* |
A. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993.* |
Schneier, Applied Cryptography, John Wiley and Sons, p. 478, Oct. 1995.* |
Menezes, et al., Handbook of Applied Cryptography, CRC Press, p. 105, 1996.* |
Rosati, A High Speed Data Encryption Processor for Public Key Cryptography, IEEE, 1989.* |
Dimitrov, Two Algorithm for Modular Exponentiation Using Nonstandard Arithmetics, IEEE, Jan. 1995.* |
Rosati T: “A High Speed Data Encrytion Processor for Public Key Crytography” Proceedings of the Custom Integrated Circuits Conference, US, New York, IEEE, vol. Conf. 11, 1989, pp. 1231-1235 XP0000757631 *PG 1231, Right Column *PG 1233 Right Column *PG 1234 Left Column. |
Heiman R: “A Note on Discrete Logariths with Special Structure” Lecture Notes Incomputer Science, US, Springer Verlag, New York, NY, vol. 658, Jan. 1, 1993, pp. 454-457, XP000562427 ISSN: 0302-9743 * Entire Document. |
Menezes A J Et Al.: “Eiliptic Curve Cryptosystems and Their Implementation” Journal of Cryptology, US, New York, NY, vol. 6, No. 4. Jan. 1, 1992, pp. 209-224, XP002069135 *PG 218-PG 219 * PG 222-PG 223*. |