6Rivist R, Shamir A, Adleman L M.A method for obtaining digital signatures and public-key cryptosystems[J].Commu- nications of the ACM, 1978,21(2) : 120-126.
7Diffie W,Hellman M E.New direction in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6): 644-654.
8Montgomery P L.Modular multiplication without trial divi- sion[J].Mathematies of Computation, 1985,44(170) : 519-52l.
9Chen Junhong, Wu Hao-Hsuan, Lin Wen-Ching, et al.A new modular exponentiation architecture for efficient design of RSA cryptosystem[J].IEEE Transactions on informa- tion Theory,2008,16(9) : 1151-1161.
10Koq C K, Kaliski B S.Analyzing and comparing mont- gomery multiplication algorithms[J].IEEE Micro, 1996,'16 (3):26-33.