5R L Rivest,A Shamir,L Adleman. A Method of Obtaining Digital Signature and Public Key Cryptosystems[J].Comm of ACM, 1978; 21 (2):120~126
6T E1Gamal.A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J].IEEE Trans on Information Theory,1985;IT-31 (4) :469~472
7G R Blakley. A Computer Algorithm for Calculating the Product AB Modulo M[J].IEEE Trans, 1983; C-32(5) :497~500
8F E Su ,T Hwang. Comments on Iterative Modular Multiplication Without Magnitude Comparison[C].In:Proceeding of the Sixth National Conference on Information Security,Taichung,Taiwan,1996:21~22
9C K Koc,C Y Hung. Adaptive M-ary Segmentation and Canonical Recoding Algorithms for Multiplication of Large Binary Numbers[J].Computers and Mathematics with Applications, 1992; 24 (3): 3~ 12
10B J Phillips,N Burgess. Implementing 1024-bits RSA Exponentiation on a 32-bits Processor Core[C].In :IEEE International Conference on Application Specific Systems,Architecture,and Processors(ASAP'00),2000