1. M. Thangavel, M. Thangavel, M. Murrali, and K. Nithya, Journal of Information Security and Applications 7, 177–195 November (2015).
2. P. U. Ivy, P. Mandiwa, and M. Kumar, International Journal of Engineering And Computer Science 1, 63–66 (2012).
3. A method for obtaining digital signatures and public-key cryptosystems
4. B. Yang, H. Ma, and S. Zhu, International Journal of Network Security 5, 182–186 (2007).
5. L. Harn, C.-C. Chang, and H.-L. Wu, International Journal of Network Security 15, 307–312 (2013).