3RIVEST R, SHAMIR A, ALDEMAN L. A method for obtaining digital signatures and public-key cryptosystems [ J]. Communications of the ACM, 1978, 21(2) : 120 - 126.
4COLLINS T, HOPKINS D, LANGFORD S, et al. Public key cryptographic apparatus and method: US, 4218582 [ P]. 1997.
5BONEH D, SHACHAM H. Fast variants of RSA [ J]. RSA Laboratories Crypto-bytes, 2002, 5(1): 1-8.
6MATSUMOTO T, KATO K. Speeding up secret computations with insecure auxiliary devices [ C] //Proceedings of the gth Annual International Crypto Conference on Advances in Cryptology. London: Springer-Verlag, 1988:497-506.
7PAXSON V, SOMMER R. An architecture for exploiting multi-core processors to parallelize network intrusion prevention [ C]//Proceedings of the IEEE Saruoff Symposium. Washington, DC: IEEE Computer Society, 2007:1 -7.
8SILVERMAN R, WAGSTAFF S. A practical analysis of the elliptic curve factoring algorithm [ J]. Mathematics of Computation, 1993, 61(203) : 455 -462.
9LENSTRA A K, VERHEUL E R. Selecting cryptographic key sizes [ J]. Journal of Cryptology: the Journal of the International Association for Cryptologic Research, 2001, 14(4): 255 -293.
10TIMOTHY G, BEVERLY A. Patterns for parallel programming [ M]. Boston, MA: Addison-Wesley, 2005.