2a9217bf822fee64.tex
1: \begin{thebibliography}{10}
2: \bibitem[1]{key-1} D.Harvey, J.Hoeven. Integer multiplication in
3: time O(n log n). 2019. hal-02070778
4: 
5: \bibitem[2]{key-2}J.W.Cooley, J.W.Tukey. An Algorithm for the Machine
6: Calculation of Complex Fourier Series. Mathematics of Computation,
7: Volume 19, Issue 90, (Apr., 1965), 297-301
8: 
9: \bibitem[3]{key-3}A. Karatsuba and Yu. Ofman (1962). Multiplication
10: of Many-Digital Numbers by Automatic Computers. Proceedings of the
11: USSR Academy of Sciences. 145: 293--294. Translation in the academic
12: journal Physics-Doklady, 7 (1963), pp. 595--596
13: 
14: \bibitem[4]{key-4}Wadleigh, Kevin R.; Crawford, Isom L. (2000), Software
15: optimization for high-performance computing, Prentice Hall, p. 92,
16: ISBN 978-0-13-017008-8.
17: 
18: \bibitem[5]{key-5}Gillings, Richard J. (1962). The Egyptian Mathematical
19: Leather Roll, Australian Journal of Science 24: 339--44. Reprinted
20: in his (1972) Mathematics in the Time of the Pharaohs. MIT Press.
21: Reprinted by Dover Publications, 1982.
22: 
23: \bibitem[6]{key-6}Knuth, Donald Ervin (2009). \textquotedbl Bitwise
24: tricks \& techniques; Binary Decision Diagrams\textquotedbl . The
25: Art of Computer Programming. Volume 4, Fascicle 1. Addison--Wesley
26: Professional. ISBN 0-321-58050-8.
27: 
28: \bibitem[7]{key-7}Aoki, K.; Kida, Y.; Shimoyama, T.; and Ueda, H.
29: \textquotedbl GNFS Factoring Statistics of RSA-100, 110, ..., 150.\textquotedbl{}
30: April 16, 2004.
31: 
32: \bibitem[8]{key-8}von Neumann, John (1945), First Draft of a Report
33: on the EDVAC.
34: 
35: \bibitem[9]{key-9}Batchelder, Paul M. (1967). An introduction to
36: linear difference equations. Dover Publications.
37: 
38: \bibitem[10]{key-10}John L. Gustafson (2015). The End of Error: Unum
39: Computing. Chapman \& Hall/CRC Computational Science
40: \end{thebibliography}
41: