참고문헌
- IEEE Trans. Inform. Theory v.31 no.4 A public key cryptosystem and a signature scheme based on discrete logarithms T. ElGamal
- Comm. of ACM v.21 no.2 A method for obtaining digital signatures and public key cryptosystems R. Rivest;A. Shamir;Adleman
- Advances in Cryptology-CRY PTO '89 Proceedings Efficient signature generation for smart cards C. P. Schnorr
- Specifications for a Secure Hash Standard(SHS), FIPS YY Draft National Institute Standard Technology
- Seminumerical Algorithms(2nd Ed.) v.2 The Art of Programming D. E. Knuth
- Advances in Cryptology, Proc. CRY PTO '93 Comparison of three modular reduction functions A. Bosselaers;R. Govaerts;J. Vandewalle
- Advances in Cryptology, Proc. CRY PTO '86 Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor Paul Barrett
- Math. of Comp. v.44 no.170 Modular multiplication without trial division Peter L. Montgomery
- Advances in cryptology, Proc. EU ROCRY PT '90 A cryptographic library for the Motorola DSP 56000 S. R. Dusse;B. S. Kaliski
- 한국통신 정보보호학회 논문집 v.6 no.1 고속 멱승을 위한 새로운 모듈라 감소 알고리듬 하재철;이창순;문상재