4HULE H, MULLER W B. On the RSA cryptosystem with wrong keys[A]. Contributions to General Algebra 6[C].Vienna: Verlag Holdeer-Pichler-Tempsky, 1988.103-109.
5DESMEDT Y, ODLYKZO A M. A chosen text attack on the RSA cryptosystem and ssome discrete logarithm problems[A]. Advances in Cryptology- CRYPTO' 85Proceedings[C]. New York: Springer-Verlag, 1986.21-39.
6HASTAD J. On using RSA with low exponent in a public key network[A]. Advances in Cryptology-CRYPTO'85 Proceedings[C]. New York: Springer-Verlag, 1986.403-408.
7DELAURENTIS J M. A further weakness in the common modulus protocol for the RSA cryptosystem[J].Cryptologia, 1984,8(3): 253-259.
8SHANNON C E. Communication theory of secrecy systems[J]. Bell System Technical Joumal, 1949, 28: 656-715.
9KAHN D. The codebreakers: the story of secrete writing [M]. New York: Macmillan Publishing Co, 1967.
10RIVEST R L, SHAMIR A, ADLEMAN L M. Amethod for obtaining digital signatures and public-key cryptosysterns[J]. Communications of the ACM, 1978, 21(2):120-126.