1. John A. Adam: “Cryptography = privacy?”, Special Report Data Security, IEEE Spectrum, August 1992, S. 29–35.
2. Alfred V. Aho, John E. Hoperoft, Jeffrey D. Ullman: “The Design and Analysis of Computer Algorithms”, Addison Wesley, Massachusetts, 1974.
3. E. Brickell, D.M. Gordon, K.S. McCurley, D. Wilson: “Fast Exponentiation with Precomputation”, Eurocrypt ‘82, Extended Abstracts, 24.-28.3.1992, Balatonfüred (Ungarn), S.193–201.
4. L. Blum, M. Blum, M. Schub: “A Simple Unpredictable Pseudo-Random Number Generator”, SIAM J. Computing, 15 /2, 1986, S. 364–383.
5. Jurjen Bos, Mattijs Coster: “Addition Chain Heuristics”, Proc. of Crypto ‘89, LNCS Nr.435, Springer, Berlin 1989, S. 377–386.