References
- IEEE Trans. on Info. Theory v.IT-22 no.6 New Directions in Crytography W. Diffie;M. Hellman
- Communication of the ACM v.21 A Method for Obtaining Digital Signatures and Public-key Cryptosystems Rivest, R. L.;Shamir, A.;Adleman, L.
- IEEE Trans. Information Theory v.IT-31 no.4 A Public-Key Cryptosystem and Signature Scheme Based on Discrete Logarithms T. Elgamal
- Lecture Notes in Computer Science 263 Implementing the Rivest Shamir and Adleman Pulblic Key Encryption Algorithm on a Standard Digital Signal Processor, Advances in Cryptology-CRYPTO '86 D. Barret;A. M. Odlyzko(ed.)
- Intern. J. comput. Math. v.40 A Faster Modular Multiplication Algorithm E. Eldridge
- IEEE Trans on Computers v.42 no.6 Hardware Implementation of Montgomery's Modular Multiplication Algorithm E. Eldridge;C. D. Walter
- Advances in Cryptology-CRYPTO '82 A Fast Modular Multiplication Algorithm with Application to Two-Key Cryptography E. F. Brickell;Chaum(et al.)
- Electronics Letter v.30 no.17 Fast Square-and-Multiply Exponentiation for RSA Hui, L. C. K.;Lam, K. Y.
- Advances in Cryptology-CRYPTO '93 Comparison of Three Modular Reduction Functions Antoon Bosselaers;Rene Govaerts;Joos Vandewalle
- Mathemat. of Computat v.44 Modular Multiplication Without Trial Division P. L. Montgomery
- Finate Field for Computer Scientists and Engineers R. J. McEliece
- Introduction to Finite Fields and Their Application R. Lidl;H. Niederreiter
- In Proceedings of Third Workshop on Selected Area in Cryptography Montgomery Multiplication in GF(2k) Koc, C. K.;Acar, T.
- IEEE Micro Analyzing and Comparing Montgomery Multiplication Algorithms Koc, C. K.;Acar, T.;Kaliski, jr. B. S.