[1] Whitfield Diffie and Martin E. Hellman, “New Direction in Cryptography,” IEEE Transaction on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976.
[2] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, pp. 120-130, February 1978.
[3] Brickell, “A First Modular Multiplication Algorithm with Application to Two Key Cryptography,” in Advance in Cryptology (Proceeding of CRYPTO ’82), pp. 51-60, Academic Press, 1983.
[4] P. L. Montgomery, “Modular multiplication without trial division,” Math. Computation, vol. 44, pp. 519-521, 1985.
[5] Koc and C. Y. Hung, “Bit-level Systolic Array for Modular Multiplication,” Journal of VLSI Signal Processing, vol. 3, pp. 215-223, 1991.
[6] Stephen E. Eldridge and C. D. Walter, “Hardware Implementation of Montgomery’s Modular Multiplication Algorithm,” IEEE Transaction on Computers, vol. 42, no. 6, pp. 693-699, June 1993.
[7] Colin D. Walter, “Systolic Modular Multiplication,” IEEE Trans. Computers, vol. 42, no. 3, March 1993.
[8] Po-Song Chen, Shih-Arn Hwang, and Cheng-Wen Wu, “A Systolic RSA Public Key Cryptosystem,” in Proc. IEEE Int. Symp. Circuits and Systems (ISCAS), vol. 4, (Atlanta), pp. 408-411, May 1996.
[9] Jin-Hua Hong and Chen-Wen Wu, “Radix-4 Modular Multiplication and Exponentiation Algorithms for the RSA Public-Key Cryptosystem,” in Proc. Asia and South Pacific Design Automation Conf. (ASP-DAC), (Yokohama), pp. 565 -570, 2000.
[10] Jin-Hua Hong and Chen-Wen Wu, “RSA public key crypto-processor core design and hierarchical system test using IEEE 1149 family,” PhD Thesis, National Tsing-Hua University, Taiwan, June 2000.
[11] Ching-Chao. Yang, Tian-Sheuan Chang, and Chein-Wei Jen, “A New RSA Cryptosystem Hardware Design Based on Montgomery’s Algorithm,” IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 45, no. 7, pp. 908-913, July 1998.
[12] Fang Yingli, Gao Zhiqiang, “A New RSA Cryptosystem Hardware Implementation Based on High-Radix Montgomery’s Algorithm,” 4th International ASIC conf., pp. 348 -351, 2001.
[13] Y.-H. Hsieh, “Design and Implementation of an RSA Encryption /Decryption Processor on IC Smart Card,” Master’s Thesis, National Taiwan University, Taiwan, June 1999.
[14] 曾希哲, “RSA加解密晶片之設計與分析,” 國立海洋大學, 碩士論文, 1999.[15] 吳哲漢, “RSA密碼系統之演算法研究與快速硬體實現,” 雲林科技大學, 碩士論文, 1999.[16] 李政德, “以Montgomery演算法為基礎之RSA密碼系統硬體實作,” 逢甲大學碩士論文, 2001.[17] 楊吳泉, 現代密碼學入門與程式設計, 全華科技圖書股份有限公司, 1996.
[18] 賴溪松、韓亮、張真誠, 近代密碼學及其應用, 松崗電腦圖書資料股份有限公司, 1995.
[19] 曾志光、巫坤品 譯, William Stallings 著, 密碼學與網路安全原理與實務(第二版), 碁峰資訊股份有限公司, 2001.
[20] 劉尊全, 數為時代密碼技術的現狀與未來, 松崗電腦圖書資料股份有限公司, 2001.
[21] 曾志光、鄭光廷 譯, “Patterson Hennessy 著 計算機組織與設計”, 第二版 pp. 4-57~4-61, 碁峰資訊股份有限公司, 2002.
[22] P. Ribenboim, “The New book of Prime Number Records,“ New York: Springer-Verlag, 1996.
[23] B. Kaliski, and M. Robshaw, “The Secure Use of RSA,” CryptoBytes, Autumn 1995.
[24] Michael J. Wiener, “Cryptanalysis of Short RSA Secret Exponents.” IEEE Transactions on Information Theory, vol. 36, 1990.
[25] P. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other System.” Proceedings, Crypto ’96, August 1996; published by Springer-Verlag.
[26] Jye-Jong Leu, and An-Yeu Wu, “Design Methodology for Booth-Encoded Montgomery Module Design for RSA Cryptosystem,” in Proc. IEEE International Symposium on Circuit and Systems, vol. 5, pp. 357-360, 2000.
[27] Jin-Hua. Hong, and Chen-Wen Wu, “Cellular-Array Modular Multiplier for Fast RSA Public-Key Crypto-system Based on Modified Booth’s Algorithm,” IEEE Transactions on VLSI Systems, vol. 11, no. 3, pp. 474-484, June 2003.
[28] 劉奇昌, “高效能RSA密碼系統之硬體設計,” 國立中正大學, 碩士論文, 2000.[29] 劉俊麟, “以四為基底之高速RSA加解密系統晶片,”大葉大學,碩士論文,2003.[30] Chih-Yuang Su, Shih-Arn Hwang, Po-Song Chen, and Cheng-Wen Wu, “An Improved Montgomery’s Algorithm for High-Speed RSA Public-Key Cryptosystem,” IEEE Transactions on VLSI Systems, vol. 7, no. 2, pp. 280-284, June 1999.
[31] S. Y. Kung, “VLSI Array Processors, Englewood Cliffs,” New Jersey: Prentice-Hall Inc., 1988.
[32] 蔡秉諺, “以四為基底之心脈式RSA加解密系統晶片,”大葉大學,碩士論文,2004.[33] Keshab K. Parhi, “VLSI Digital Signal Processing Systems,” John Wiley & Sons, INC. 1999 Chap. 7 pp. 189-192
[34] Cheng-Wen Wu, Peter R. Cappello, “Easily Testable Iterative Logic Arrays,” IEEE Transactions on Computers, vol. 39, no. 5, pp.640-652, May 1990.
[35] Sandeep Bhatia, Alexander Albicki, “Testing of Iterative Logic Arrays,” IEEE Transactions on Circuits and Systems, vol. 1, pp.243-246, August 1990.
[36] Tsu-Wei Ku, Mani Soma, “Minimal Overhead Modification of Iterative Logic Arrays for C-testability,” IEEE International Test Conference, pp.964-968, 1990.
[37] Shyue-Kung Lu; Jen-Chuan Wang; Cheng-Wen Wu, “C-Testable Design Techniques for Iterative Logic Arrays,” IEEE Transactions on VLSI Systems, vol. 3, no. 1, pp.146-152, March 1995.