Content deleted Content added
→References: pollard |
Tolly4bolly (talk | contribs) m Reverted 1 edit by 2A01:36D:1000:E55:4434:1A2F:54C:50AC identified as test/vandalism using STiki |
||
Line 46:
*{{cite book|title=An Introduction To Cryptography|last=Mollin|first= Richard|date=2006-09-18|publisher=Chapman and Hall/CRC|edition=2nd|isbn=978-1-58488-618-1|page=344|ref=Mollin06}}
*{{cite journal | authors=S. Pohlig and [[Martin Hellman|M. Hellman]] | title=An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance | journal=[[IEEE]] Transactions on Information Theory | issue=24 | year=1978 | pages=106–110 | url=http://www-ee.stanford.edu/~hellman/publications/28.pdf}}
*{{cite book|first1=Alfred J.|last1=Menezes|authorlink1=Alfred Menezes|first2=Paul C.|last2=van Oorschot|authorlink2=Paul van Oorschot|first3=Scott A.|last3=Vanstone|authorlink3=Scott Vanstone|title=Handbook of Applied Cryptography|url=http://www.cacr.math.uwaterloo.ca/hac/|publisher=[[CRC Press]]|year=1997|pages=107–109|chapter=Number-Theoretic Reference Problems|chapterurl=http://www.cacr.math.uwaterloo.ca/hac/about/chap3.pdf|isbn=0-8493-8523-7|ref=Menezes97}}
{{Number-theoretic algorithms}}
|