[1] J.Sai Geetha , D.I. George Amalarethinam “Enhancing Security level for Public Key Cryptosystem using MRGA” 2014 IEEE world Conference on computing and communication technologies .
[2] Hardik gandhi, vinit gupta, indra rajput, “A Research on Enhancing Public Key Cryptography by The Use of MRGA N-Prime RSA” International Journal of Innovative Research in Computer and Communication Engineering ISSN (Online): 2349 – 6010Vol.1, Issue 12, may 2015
[3] Thiranant, Young Sil Lee, HoonJae Lee , “Performance Comparison between RSA and Elliptic Curve Cryptography-based” 2015 IEEE , 29th International Conference on Advanced Information Networking and Applications Workshops
[4] Elaine L. Render August, “Wiener's Attack on Short Secret Exponents”, Reference Site -IEEE, Proceedings of August 15, 2007.
[5] Gopinath Ganapathy, and K.Mani , “ Add-On Security Model for public key Cryptosystem Based on Magic Square Implementation”, ISBN 978-988-17012-6-8, Proceedings of the world congress on Engineering and Computer Science 2009 Vol I, San Fransisco, USA
[6] http://searchsecurity.techtarget.com/definition/RSA
[7] https://en.wikipedia.org/wiki/RSA_(cryptosystem)
[8] B R Ambedkar, Ashwani Gupta, Pratiksha Gautam, “An Efficient Method to Factorize the RSA Public Key Encryption”, International Conference on Communication Systems and Network Technologies, 2011.
[9] https://en.wikipedia.org/wiki/Sch%C3%B6nhage_Strassen_Algorithm.
[10] http://mathworld.wolfram.com/PellEquation.html.
[11] Sahadeo Padhye “A Public Key Cryptography Based on PELL‟S Equation “in School of Studies in Mathematics.
[12] Michael J.JacobSon and Jr.Hugh C.Williams 2009 “Solving the Pell Equation”, pages 353-359.