References
- Algorithmic Number Theory v.Ⅰ Efficient Algorithms Eric Bach;Jeffrey Shallit
- 소인수 분해 알고리즘 분석에 관한 연구 한국전자통신연구소
- Handbook of Applied Cryptography A. J. Menezes;P. C. van O.orschot;S. A. Vanstone
- CryptoBytes v.1 no.2 The future of integer factorzation A. Oldyzko
- Remarks on the Scurity of the elliptic curve crytosystem Certicom Corp.
- CryptoBytes v.1 no.3 RSA for Paranoids Adi Shamir
- Lecture note on Cryptography Shafi Goldwasser;Mihir Bellare
- Distributed Programming Paradigms with Cryptography Application Jonathan S. Greenfield
- A Course in Number Theory(2nd ed.) H. E. Rose
- Applied Cryptography: Protocols, Algorithms, and Source Code in C(2nd ed.) B. Schneier
- Cryptography Theory and Practice D. R. Stinson
- 한국통신정보보호확회지 v.1 no.1 소인수 분해와 암호학 임종인;김창한
- 한국통신정보보호학회지 v.1 no.1 연분수와 암호학 조인호
- Elloptic Curve Public Key Cryptosystem Alfres Menezes
- Primality and Cryptography Evangelos Kranakis
- A First Course in Abstract Algebra(3rd ed) John B. Fraleigh
- Factorizationand Primality Testing David M. Bressoud
- CryptoBytes v.1 no.3 The Secure Use of RSA Burt Kaliski;Matt Robshaw
- Advances in Cryptology, Cryto`95 NFS with Four Large Primes: An Explosive Experiment Bruce Dodson;Arjen K. Lenstra
- A Course in Number Theory and Crytography Neal Koblitz
- 통신정보보호학회지 v.7 no.4 타원곡선을 이용한 암호 시스템 양대현;송주석
- Advances in Cryptology, Cryto`93 An implementation of the general number field sieve J. Buchmann;J. Zayer