<references>
<title>References and Suggested Readings</title>
<biblio type="raw">
Koblitz, N.
<title>A Course in Number Theory and Cryptography</title>.
2nd ed. Springer, New York, 1994.
</biblio>
<biblio type="raw" xml:id="biblio-pomerance-1990">
Pomerance, C.
<q>Cryptology and Computational Number Theory<mdash />An Introduction,</q>
in
<title>Cryptology and Computational Number Theory</title>,
Pomerance, C., ed. Proceedings of Symposia in Applied Mathematics, vol. 42, American Mathematical Society, Providence, RI, 1990. This book gives an excellent account of how the method of repeated squares is used in cryptography.
</biblio>
</references>
References 2.8 References and Suggested Readings
View Source for references
View Source for biblio
<biblio type="raw">
Koblitz, N.
<title>A Course in Number Theory and Cryptography</title>.
2nd ed. Springer, New York, 1994.
</biblio>
[1]
Koblitz, N. A Course in Number Theory and Cryptography. 2nd ed. Springer, New York, 1994.
View Source for biblio
<biblio type="raw" xml:id="biblio-pomerance-1990">
Pomerance, C.
<q>Cryptology and Computational Number Theory<mdash />An Introduction,</q>
in
<title>Cryptology and Computational Number Theory</title>,
Pomerance, C., ed. Proceedings of Symposia in Applied Mathematics, vol. 42, American Mathematical Society, Providence, RI, 1990. This book gives an excellent account of how the method of repeated squares is used in cryptography.
</biblio>
[2]
Pomerance, C. “Cryptology and Computational Number Theory—An Introduction,” in Cryptology and Computational Number Theory, Pomerance, C., ed. Proceedings of Symposia in Applied Mathematics, vol. 42, American Mathematical Society, Providence, RI, 1990. This book gives an excellent account of how the method of repeated squares is used in cryptography.