[1] A. V. Aho et al., The Design and Analysis of Computer Algorithms, Addison-Wesley, (1975). [2] T. Okamoto.[J].Electron. Lett..1986,22:11- [3] 李大兴,张泽增,科学通报,35 (1990) 11, 871-8740. [4] 杨义先,李世群,罗群,通信学报,10 (1989)2, 78-80. [5] 李大兴,赵霖,通信学报,11 (1990) 1, 93-96. [6] M. J. Wiener, IEEE Trans. on IT, IT-36 (1990) 3, 553-558. [7] R. Lidl, W. B. Muller, Advances in Cryptology-Proc. Crypto 83, Plenum Press, New York, (1984), [8] pp. 293-301. [9] V. Varadharajan, ins. J. Computer Math., 23 (1988) 2, 237-250. [10] S. C. Kak, A. Chatterjee, IEEE Trans, on IT, IT-27(1981)5, 647-652. [11] S. C. Kak, IEEE Trans. on C, C-24 (1985) 9, 803-809. [12] 高宝建,通信学报,10 (1989) 4, 74-770.
|