B. Schneier, Applied Cryptography, Second Edition ©'96 pp. 416-418.* |
“Applied Cryptography,” 2nd ed., by Bruce Schneier, pp. 13-15, 28-29, 151-155, 158-165, 265-267, 1996.* |
The discrete logarithm modup a composite hides $O(n)$ bits, 1993.* |
Bruce Schneier, “Applied Cryptography,” 2nd Edition, pp. 28, 29, 397, 416-418, and 725, 1995.* |
Rene Peralta, “Simultaneous Security Bits In the Discrete Log,” in Advances in Cryptology Eurocrypt '85, pp. 62-72, 1986.* |
S. Pohlog & M. Hellman, “An Improved Algorithm for Computing Logarithms over GF(P) and its Cryptographic Significance,” IEEE Trans. on Info Theory, vol. 1, No. 1, Jan 1978. |