[1] A. V. Aho et al., The Design and Analysis of Computer Algorithms, Addison-Wesley, (1975). [2] T. Okamoto.[J].Electron. Lett..1986,22:11- [3] 李大興,張澤增,科學(xué)通報,35 (1990) 11, 871-8740. [4] 楊義先,李世群,羅群,通信學(xué)報,10 (1989)2, 78-80. [5] 李大興,趙霖,通信學(xué)報,11 (1990) 1, 93-96. [6] M. J. Wiener, IEEE Trans. on IT, IT-36 (1990) 3, 553-558. [7] R. Lidl, W. B. Muller, Advances in Cryptology-Proc. Crypto 83, Plenum Press, New York, (1984), [8] pp. 293-301. [9] V. Varadharajan, ins. J. Computer Math., 23 (1988) 2, 237-250. [10] S. C. Kak, A. Chatterjee, IEEE Trans, on IT, IT-27(1981)5, 647-652. [11] S. C. Kak, IEEE Trans. on C, C-24 (1985) 9, 803-809. [12] 高寶建,通信學(xué)報,10 (1989) 4, 74-770.
|