“Cryptographic Theory”, “Specific integer factorization method is effective to certain kinds of integer. For instance, p−1 method and p+1 method are effective to the case where p−1 and p+1 do not respectively have a large factor”, Oct. 1, 1996, p. 168, lines 5-6. |
“Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters”, Nov. 14, 1994, pp. 26 and 27, Maurer. |
“Faster generation of secure RSA-moduli with almost maximal diversity, Advances in Cryptology-Eurocrypt '89, Lecture Notes in Computer Science”,Mar., 1993, Maurer. |
Menezes et al, Handbook of Applied Cryptography, Chapter 4, p. 133-154, 1996.* |
Maurer, “Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity”, Advances in Cryptology-Eurocrypt '89, Lecture Notes in Computer Science, Mar. 1993.* |
The Prime Pages, “Finding Primes and Proving Primality”, http://www.utm.edu/research/primes/prove/prove3.htm [internet] Jan. 2000.* |
Maurer, “Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters”, Journal of Cryptology, Nov. 1994. |