4WANG X-Y, YU H-B. How to Break MD5 and Other Hash Functions[ EB/OL]. http://www, infosec, sdu. edu. cn/paper/md5-at-tack. pdf, 2004 - 12.
5COHEN H. A Course in Computational Algebraic Number Theory[ M], Berlin: Springer-Verlag, 1996.13, 31.
二级参考文献5
1RIVEST RL,SHAMIR A,ADLEMAN L.A Method for Obtaining Digital Signatures and Public-Key Cryptosystems[EB/OL].http://theory.lcs.mit.edu/~rivest/rsapaper.pdf,2004.
2ELGAMAL T.A Public-key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[A].Advances in Cryptology:Proceeding of CRYPTO 84[C].Spinger-Verlag,1985.10-18.
3RABIN MO.Digitalized signatures and public-key functions as intractable as factorization[R].Technical Report LCS/TR212,Cambridge MA:MIT,1979.
4RABIN MO.Probabilistic algorithms in finite fields[J].SICOMP,1980,9(2):273-280.