Handbook of applied cryptography, 1997. ,
DOI : 10.1201/9781439821916
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.22644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Guide to Elliptic Curve Cryptography, 2004. ,
Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985. ,
DOI : 10.1090/S0025-5718-1985-0777282-X
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor, Advances in Cryptology ? CRYPTO '86, pp.311-326, 1986. ,
DOI : 10.1007/3-540-47721-7_24
Method and apparatus for public key exchange in a cryptographic system, U.S, 1992. ,
Generalized mersenne numbers Research Report CORR-99-39, Center for Applied Cryptographic Research, 1999. ,
More Generalized Mersenne Numbers, Selected Areas in Cryptography ? SAC 2003, 2003. ,
DOI : 10.1007/978-3-540-24654-1_24
Modular Number Systems: Beyond the Mersenne Family, LIRMM ? CNRS, 161 rue Ada, 2004. ,
DOI : 10.1007/978-3-540-30564-4_11
URL : https://hal.archives-ouvertes.fr/lirmm-00109208
An Algorithmic Theory of Numbers, Graphs and Convexity, CBMS- NSF Regional Conference Series in Applied Mathematics. SIAM Publications, 1986. ,
DOI : 10.1137/1.9781611970203
Complexity of Lattice Problems, A Cryptographic Perspective, 2002. ,
Lattices and their applications to cryptography. Lecture notes, 1998. ,
Factoring polynomials with rational coefficients, Mathematische Annalen, vol.32, issue.4, pp.515-534, 1982. ,
DOI : 10.1007/BF01457454
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.318