f5283493a108f57f.tex
1: \begin{thebibliography}{55}
2: 
3: \bibitem{rsa}
4:   R.L. Rivest, A. Shamir, and L. Adleman,
5:   A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,
6:   Comm. of ACM,
7:   1983.
8: 	
9: 	\bibitem{Stallings}
10:   W. Stallings,
11:   Cryptography and Network Security Principles and Practice,
12:   5th ed. USA: Pearson Education, Inc,
13:   2nd edition,
14:   2011.
15: 	
16: 	\bibitem{Knuth}
17:   Knuth, D. E.,
18:   The Art of Computer Programming, Vol 2: Seminumerical Algorithms.,
19:   Addison-Wesley, Reading, Mass.,
20:   1969.
21: 	
22: 	\bibitem{D1}
23:   Diffie, W., and Hellman, M.
24:   New directions in cryptography. 
25:   IEEE Trans. Inform. Theory IT-22, (Nov. 1976), 644-654.
26:   (Nov. 1976), 644-654.
27: 	
28: 	\bibitem{D1}
29:   Diffie, W., and Hellman, M.
30:   New directions in cryptography. 
31:   IEEE Trans. Inform. Theory IT-22, (Nov. 1976), 644-654.
32:   (Nov. 1976), 644-654.
33: 	
34: 	\bibitem{D2}
35:   Diffie, W., and Hellman, M. 
36:   Exhaustive cryptanalysis of the NBS data encryption standard,
37:   Computer 10, 
38:   June 1977), 74-84.
39: 	
40: 	\bibitem{MR}
41:   Miller, G.L. Riemann’s hypothesis and tests for primality. 
42:   Proc. Seventh Annual ACM Symp. on the Theory of Comptng,
43:   Albuquerque, New Mex., 
44: 	May 1975, pp. 234-239
45: 	
46: 	\bibitem{MR}
47:   Goldwasser, S. and Bellare, M., 
48:   Lecture Notes on Cryptography,
49:   MIT, 
50: 	July 2008.
51: 	
52: 	\noindent\bibitem{RO}
53:   Rabin, M.O., 
54:   Probabilistic algorithms. In Algorithms and Complexity,
55:   J. F. Traub, Ed., Academic Press,
56: 	New York, 1976, pp. 21-40.
57: \end{thebibliography}
58: