1. Bach, E., & Shallit, J. (1996). Algorithmic number theory: Volume 1 – Efficient algorithms. MIT Press.
2. Coppersmith, D., Coron, J., Grieu, F., Halevi, S., Jutla, C., Naccache, D., et al. (2008). Cryptanalysis of ISO/IEC 9796–1. Journal of Cryptology, 21(1), 27–51. https://doi.org/10.1007/s00145-007-9007-5. Zugegriffen am 06.05.2024.
3. Lecture notes in computer science;JS Coron,2009
4. ElGamal, T. (1984). A public key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of CRYPTO 84 on Advances in Cryptology (S. 10–18). Springer New York, Inc.
5. Gilbert, G., & Hamrick, M. (2000). Practical quantum cryptography: A comprehensive analysis (part one). http://www.citebase.org/abstract?id=oai:arXiv.org:quant-ph/0009027. Zugegriffen am 06.05.2024.