1. A Method for Obtaining digital signatures and public-key cryptosystems;Rivest R;Communications Of The Acm,1978
2. Diffie, W., & IIellman, M. E. (1976). New directions in cryptography, IEEE Transactions Information Theory, Vol. 22, No. F, pp. 644–654 011.
3. Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography In Towards a quarter – century of public key cryptography, springer US. pp 103–123.
4. Koyama, K., Maurer, U. M., Okamoto, T., & Vanstone, S. A. (1991). New Public-Key Schemes Based on Elliptic Curves over the Ring. In Annual International Cryptology Conference; Lecture Notes in Computer Science 576 Springer Berlin/Heidelberg, Germany, pp. 252–266.
5. Hinek, M. (2009). Cryptanalysis of RSA and its Variants, Cryptography and Network Security Series. Chapman & Hall/CRC.