Menez,;Applied Cryptography; 1996; CRC press LLC; pp. 607-608 and 632.* |
Burton; Elementry number theory; 1989; Brown Publishers; second edition; pp. 31, 226 and 305.* |
Denning; Cryptography and data security; 1982; Addison-Wesely publishing company, inc; p. 42.* |
Struif, B., “The Use of Chipcards for Electronic Signatures and Encryption” IEEE, vol. Conf. 3, May 8, 1989, pp. 4-155-158. |
Miyaji, A., “Elliptic Curves Suitable for Cryptosystems”, IEICE, vol. E77-A, No. 1, 1994, pp. 98-104. |
Sedlak, H. et al., “An RSA Cryptography Processor”,. |
The Art of Computer Programming, vol. 2, Addison-Wesley, 1969, “Seminumerical Algorithms Arithmetic”, D.E. Knuth. |
Nikkei Electronics, No. 732, Dec. 14, 1998, pp. 27-28. |
Communications of the ACM, vol. 21, No. 2, Feb. 1978, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, R.L. Rivest et al. |
D.V. Chudnovsky et al, “Sequences of Numbers Generated by Addition in Forma Groups and New Primality and Factorization Tests”, Advances in Applied Mathematics, vol. 7, 1986, pp. 385-434. |
A. Shimbo, “Applications of Montgomery Arithmetics to Elliptic Curve Encryption”, SCIS, 1997, (The 1997 Symposium on Cryptography and Informatio Security). |
Chae Hoon Lim and Hyo Sun Hwang, Fast Modular Reduction With Precomputation 1997, Pohang University of Science & Technology, pp. 1-15. |
Antoon Bosselaers, Rene Govarets and Joos Vandewalle; Comparison of Three Modular Reduction Functions 1994, Katholieke Universitteit Leuven, pp. 175-186. |