3R L Rivest,A Shamir,L Adleman. A Method of Obtaining Digital Signature and Public Key Cryptosystems[J].Comm of ACM, 1978; 21 (2):120~126
4T E1Gamal.A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J].IEEE Trans on Information Theory,1985;IT-31 (4) :469~472
5G R Blakley. A Computer Algorithm for Calculating the Product AB Modulo M[J].IEEE Trans, 1983; C-32(5) :497~500
6F E Su ,T Hwang. Comments on Iterative Modular Multiplication Without Magnitude Comparison[C].In:Proceeding of the Sixth National Conference on Information Security,Taichung,Taiwan,1996:21~22
7C K Koc,C Y Hung. Adaptive M-ary Segmentation and Canonical Recoding Algorithms for Multiplication of Large Binary Numbers[J].Computers and Mathematics with Applications, 1992; 24 (3): 3~ 12
8B J Phillips,N Burgess. Implementing 1024-bits RSA Exponentiation on a 32-bits Processor Core[C].In :IEEE International Conference on Application Specific Systems,Architecture,and Processors(ASAP'00),2000
9D E Knuth. The Art of Computer Programming:Seminumerical Algorithms volume 2[M].Second edition, Reading, MA: Addison-Wesley,1981
10P Barrett.Implementing the Rivest,Shamir and Adleman Public-key Encryption Algorithm on a Standard Digital Signal Processor[C].In:Cryptology-CRYPTO'86 Proceedings,vol ,263 of Lecture Notes in Computer Science, Springer-Verlag, 1987: 311~323