1. R. L. Rivest, A. Shamir, and L. Alderman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM,21, 120–126 (1978).
2. W. Diffie and M. E. Hellman,“New directions in cryptography,” IEEE Tranc. Inform. Theory, IT-22, No. 6, 644–654 (1976).
3. T. E. Gamal, “A public-key cryptosystems and a signature scheme based on discrete logarithms,” IEEE Trans. Inform. Theory, IT-31, No. 4, 469–472 (1985).
4. S. Kawamura, K. Takabayashi, and A. Shimbo, “A fast modular exponentiation algorithm,” IEICE Trans., E-74, No. 8, 2136–2142 (1991).
5. H. Morita and C. Yang, “A modular multiplication algorithm using look-ahead determination,” IEICE Trans, E-76-A, No. 1, 70–77 (1993).