References
- M. Crochemore, An optimal algorithm for computing the repetitions in a word, Information Processing Letters 12, 5 (1981), 244-250 https://doi.org/10.1016/0020-0190(81)90024-7
- A. Apostolico and F.P. Preparata, Optimal off-line detection of repetitions in a string, Theoretical Computer Science 22 (1983), 297-315 https://doi.org/10.1016/0304-3975(83)90109-3
- M.G. Main and R.J. Lorentz, An algorithm for finding all repetitions in a string, Journal of Algorithms 5 (1984), 422-432 https://doi.org/10.1016/0196-6774(84)90021-X
- D.E. Knuth, J.H. Morris, and V.R. Pratt, Fast pattern matching in strings, SIAM Journal on Computing 6, 1 (1977), 323-350 https://doi.org/10.1137/0206024
- A. Apostolico, M. Farach, and C.S. Iliopoulos, Optimal superprimitivity testing for strings, Information Processing Letters 39, 1 (1991), 17-20 https://doi.org/10.1016/0020-0190(91)90056-N
- D. Moore and W.F. Smyth, A correction to "An optimal algorithm to compute all the cover of a string," Information Processing Letters 54, 2 (1995), 101-103 https://doi.org/10.1016/0020-0190(94)00235-Q
- Y. Li and W.F. Smyth, An optimal on-line algorithm to compute all the covers of a string, preprint
- C.S. Iliopoulos, D.W.G. Moore and K. Park, Covering a string, Algorithmica 16 (1996), 288-297 https://doi.org/10.1007/BF01955677
- C.S. Iliopoulos and W.F. Smyth, On-line algorithms for -covering, in: Proc. 9th Australasian Workshop on Combinatorial Algorithms (1998), 97-106
- S.S. Skiena and G. Sundaram, Reconstructing Strings from Substrings, Journal of Computational Biology 2 (1995), 333-353 https://doi.org/10.1089/cmb.1995.2.333
- W. Bains and G. Smith, A novel method for nucleic acid sequence determination, Journal of Theoretical Biology 135, 3 (1988), 303-307 https://doi.org/10.1016/S0022-5193(88)80246-7
- S. Fodor, J. Read, M. Pirrung, L. Stryer, A. Lu, and D. Solas, Light-directed, spatially addressable parallel chemical synthesis, Science 251 (1991), 767-773 https://doi.org/10.1126/science.1990438
- P.A. Pevzner and R.J. Lipshutz, Towards DNA sequencing by hybridization, in: 19th Symp. on Mathem. Found. of Comp. Sci., LNCS 841 (1994), 143-258
- E.M. McCreight, A space-economical suffix tree construction algorithm, Journal of ACM 23 (1976), 262-272 https://doi.org/10.1145/321941.321946
- P. Weiner, Linear pattern matching algorithms, Proc. 14th IEEE Symp. Switching and Automata Theory (1973), 1-11
- E. Ukkonen, On-Line Construction of Suffix Trees, Algorithmica 14, 3 (1995), 249-260 https://doi.org/10.1007/BF01206331
- D. Gusfield, Algorithms on Strings, Trees, and Sequences, Cambridge Univ. Press 1997
- R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 ,2 (1978), 120-126 https://doi.org/10.1145/359340.359342
- T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31, 4 (1985), 469-472 https://doi.org/10.1109/TIT.1985.1057074
- National Institute of Standards and Technology, Digital Signature Standard, FIPS Publication 186 (1994)
- D.M. Gordon, A Survey of Fast Exponentiation Methods, Journal of Algorithms 27, 1 (1998), 129- 146 https://doi.org/10.1006/jagm.1997.0913
- Y. Yacobi, Fast exponentiation using data compresseio, SIAM Journal on Computing 28, 2 (1998), 700-703 https://doi.org/10.1137/S0097539792234974
- C.S. Park, M.-K. Lee and D.K. Kim, New computation paradigm for modular exponentiation using a graph model, in: Stochastic Algorithms: Foundations and Applications (SAGA 2005), LNCS 3777 (2005), 170-179 https://doi.org/10.1007/11571155_14
- D. E. Knuth, The art of computer programming: Seminumerical algorithms, Volumn 2, 2nd edition, Addison-Wesley, Reading, MA (1981) 461-485
- C. K. Koc, Analysis of sliding window techniques for exponentiation, Computers and Mathematics with Application 30, 10 (1995) 17-24