1: \begin{thebibliography}{55}
2:
3: \bibitem{rsa}
4: R.L. Rivest, A. Shamir, and L. Adleman,
5: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,
6: Comm. of ACM,
7: 1983.
8:
9: \bibitem{Stallings}
10: W. Stallings,
11: Cryptography and Network Security Principles and Practice,
12: 5th ed. USA: Pearson Education, Inc,
13: 2nd edition,
14: 2011.
15:
16: \bibitem{Knuth}
17: Knuth, D. E.,
18: The Art of Computer Programming, Vol 2: Seminumerical Algorithms.,
19: Addison-Wesley, Reading, Mass.,
20: 1969.
21:
22: \bibitem{D1}
23: Diffie, W., and Hellman, M.
24: New directions in cryptography.
25: IEEE Trans. Inform. Theory IT-22, (Nov. 1976), 644-654.
26: (Nov. 1976), 644-654.
27:
28: \bibitem{D1}
29: Diffie, W., and Hellman, M.
30: New directions in cryptography.
31: IEEE Trans. Inform. Theory IT-22, (Nov. 1976), 644-654.
32: (Nov. 1976), 644-654.
33:
34: \bibitem{D2}
35: Diffie, W., and Hellman, M.
36: Exhaustive cryptanalysis of the NBS data encryption standard,
37: Computer 10,
38: June 1977), 74-84.
39:
40: \bibitem{MR}
41: Miller, G.L. Riemann’s hypothesis and tests for primality.
42: Proc. Seventh Annual ACM Symp. on the Theory of Comptng,
43: Albuquerque, New Mex.,
44: May 1975, pp. 234-239
45:
46: \bibitem{MR}
47: Goldwasser, S. and Bellare, M.,
48: Lecture Notes on Cryptography,
49: MIT,
50: July 2008.
51:
52: \noindent\bibitem{RO}
53: Rabin, M.O.,
54: Probabilistic algorithms. In Algorithms and Complexity,
55: J. F. Traub, Ed., Academic Press,
56: New York, 1976, pp. 21-40.
57: \end{thebibliography}
58: