2Man Youngrhce,Cryptography and secure communications,1994年
3RSA Encryption and Public Key Systems. Version: 2 December 2001.
4P L Montgomery. Modular Multiplication without Trial Division. Mathematics of Computation, April 1985, 44(170):519-21.
5Thomas Blum. High Radix Modular Exponentiation on Reconfigurable Hardware. Master thesis of Worcester Polytechnic Institute, April 1999.
6Jens_Peter Kaps. High Speed FPGA Architectures for the Data Encryption Standard. A Thesis Submitted to the Faculty of the Worcester Polytechnic Stitute, 1998.
7A Tiountchik, Elena Trichina. FPGA Implementation of Modular Exponentiation.
8Young Sae Kim, Woo Seok Kang, Jun Rim Choi. Implementation of 1024 bit Modular Processor for RSA Cryptosystem. The 2nd IEEE Asia Pacific Conference on ASICs, Aug 2000.
9SANDHU R S,COYNC E J,FCINSTCIN H L,et al.Role-based access control model [J]. IEEE Computer,1996,29(2) :38-47.
10SANDHU R S,FERRAIOLO D,KUHN R. The NIST model for role-based access control: Towards a unified standard[A]. Proceedings of the Fifth ACM Workshop on Role Based Access Control [C]. Berlin, Germany:ACM, 2000: 47- 63.