References
Cryptography and Network Security: Principles and Practice. USA.: Prentice Hall Press, 2010.
The Role of Cryptography in Security for Electronic Commerce." The ITB Journal 2, no. 1 (2001): 21-50. "
Miller–Rabin Probabilistic Primality Test." In Encyclopedia of Cryptography and Security. Boston, MA: Springer, 2005. "
Miller-Rabin Test." In Encyclopedia of Cryptography and Security. Boston, MA: Springer, 2011. "
Security analysis of an RSA key generation algorithm with a large private key In Proceedings of the 14th international conference on Information security (ISC’11). Berlin, Heidelberg: Springer-Verlag, 2011.
An algorithm to obtain an RSA modulus with a large private key In IACR Cryptology ePrint Archive., 2003.
An Implementation of the AKS Primality Test." IEEE (2005). "
Primality Testing in Polynomial Time: From Randomized Algorithms to “Primes Is in P” In Lecture Notes in Computer Science. SpringerVerlag, 2004.
On the Number of Witnesses in the Miller–Rabin Primality Test." Symmetry 12, no. 6 (2020). "
The Miller–Rabin test., 2011.
Chapter IX Legendre's Symbol and Jacobi's Symbol." North-Holland Mathematical Library 31 (1988): 340-359. "