1SCHNEIER B.Applied Cryptography—Protocols,Algorithms,and Source Code in C[M].北京:机械工业出版社,2000..
2RIVERST RL, SHAMIR A, ADLEMAN LM. A Method for Obtaining Digital Signaturs and Public-Key Cryptosystems[ J]. Communications of The ACM, 1978, 21(2) : 120 - 126.