1. Lecture Notes in Mathematics,1993
2. Kleinjung, T.: rsa200 (2005),
http://www.crypto-world.com/announcements/rsa200.txt
3. Silverman, R.D.: A cost-based security analysis of symmetric and asymmetric key lengths. RSA Laboratories’ Bulletin, (revised 2001) (2000),
http://www.rsasecurity.com/rsalabs/node.asp?id=2088
4. Lecture Notes in Computer Science;P. Leyland,2002
5. Aoki, K., Kida, Y., Shimoyama, T., Ueda, H.: GNFS176 (2005),
http://www.crypto-world.com/announcements/c176.txt