1. Barrett, P.: Communications authentication and security using public key encryption - A design for implementation -. Master’s thesis, Oxford University (September 1984)
2. Lecture Notes in Computer Science;P. Barrett,1987
3. Brickell, E.F.: A fast modular multiplication algorithm with application to two key cryptography. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in cryptology Proc. of CRYPTO 1982, pp. 51–60. Plenum Press, New York (1983)
4. Benaloh, J., Dai, W.: Fast modular reduction. Rump Session of CRYPTO 1995, Santa Barbara, California (August 1995)
5. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE transactions on information theory 22, 644–654 (1976)