1RIVEST R L, SHAMIR A, ADLEMAN L M. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120-126.
2DIFFIE W, HELLMAN M E. New directions in cryptography[J].IEEE Trans Inform Theory, 1976, 22(11 ): 644-654.
3BROWN M, CHEUNG D, HANKERSON D, et al. PGP in constrained wireless devices[A]. 9th USENIX Security Symposium[C]. 2000.247- 261.
4NEEDHAM R, SCHROEDERM. Using encryption for authentication in large networks of computers[J]. Communicafons of the ACM,1978, 21(12): 993-999.
5SHAMIR A. How to share a secret[J]. Comm ACM, 1979, 22(11):612-613.