1. R L Rivest, A Shamir and L Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications ACM Vol 21 (2) (Feb 1978)
2. Dorothy E R Denning, “Cryptography and Data Security”, Addisson-Wesley (1983)
3. Texas Instruments, “TMS 32010 User’s Guide”’ (1983)
4. Donald E Knuth, “The Art of Computer Programming Volume 2-Seminumerical Algorithms”, Addisson-Wesley (second edition — 1981)
5. P D Barrett, “Communications Authentication and Security using Public Key Encryption — A Design for Implementation.” (Oxford University Programming Research Group MSc Thesis (1984)