[1] R L Rivest, A Shamir, L Adleman. A method for obtaining digital signatures and public key crypto systems[J]. Communications of the ACM, 1978, 21( 2) : 120- 126.
[2] Boneh D. Twenty years of attacks on the RSA cryptosystem[J]. Notices of the AMS,1999,46( 2) : 203-212.
[3] A.K.Lenstra. Integer factoring[J]. Designs,Codes and Cryptography,2000,19;101-128.
[4] D Boneh, G Durfee. Cryptanalysis of RSA with private key less than N0.292[ A]. Proceedings
of the 17th International Conference on Theory and Application of Cryptographic Techniques[C]. 2000. 1339- 1349.
[5] M Bellare, G Neven. Identity Based Multi signatures from RSA[A]/ /M. Abe ( Ed. ) . CT-RSA 2007: LNCS 4377 [C]. San Francisco, CA, USA, 2007.145-162.
[6] 司光东, 杨加喜, 谭示崇等 RSA 算法中的代数结构[J].电子学报,2011,39(1):242-246.
[7] 裴东林,胡建军,李旭 RSA 算法中 的代数结构研究[J] 计算机工程,2013,39(2):145-149
[8] 闵嗣鹤, 严士健. 初等数论[M] .第三版.北京:高等教育出版社, 2003.
[9] N.Ferguson, R.Shroeppel, D.Whiting. A simple algebraic representation of Rijndael[A] . Proceedings of Selected Areas in Cryptography[C] .Las Vegas,USA: Springer-Verlag. 2001.
103- 111.
[10] S Murphy,M J B Robshaw. Essential algebraic structure within the AES[A] .Advances in Cryptology-CRYPTO 2002[C] . Amsterdam, Netherlands:Springer-verlag. 2002. 1- 16.
[11] J Fuller, W Millan. On linear redundancy in the AES S-box [DB].Available: http: / / eprint. iacr.org.
[12] 肖国镇, 白恩健, 刘晓娟. AES密码分析的若干新进展[J].电子学报,2003,31(10);1549-1554.
[13] Simmons GJ , Norris M J . Preliminary comment s on the M. I. T. public2key cryptosystem[J] . Journal of Cryptology , 1977 , 1 : 406-414.