1. Cryptography and Network Security;Stallings,2003
2. A method for obtaining digital signatures and public-key cryptosystems;Rivest;Communications of the ACM,1978
3. American Bankers Association, ANSI X9.62-1998: public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ECDSA), 1998.
4. Finding collisions in the full SHA-1;Wang,2005
5. P. Gauravaram, A. McCullagh, E. Dawson, Collision attacks on md5 and sha-1: is this the sword of damocles for electronic commerce? in: Proccedings of AusCERT Asia Pacific Information Technology Security Conference (AUSCERT2006): Refereed R& D STREAM, 2006, pp. 73–88.