1. R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,”Communications of the ACM, 21, 1978, pp. 120–126.
2. A.G. Konheim,Cryptography, A Primer. New York: John Wiley, 1981.
3. N. Koblitz., “A Course in Number Theory and Cryptography, New York: Springer-Verlag, 1987.
4. M.A. Soderstrand, W.K. Jenkins, G.A. Jullien, and F.J. Taylor, (ed.),Residue Arithmetic: Modern Applications in Digital Signal Processing, New York: IEEE Press, 1986.
5. K. Hwang,Computer Arithmetic, Principles, Architecture, and Design. New York: John Wiley, 1979.