%% oldest and most popular article about known attacks on RSA.
@article{20years,
  title = {Twenty years of attacks on the RSA cryptosystem},
  author = {Boneh, Dan and Rivest, Ron and Shamir, Adi and Adleman, Len and others},
  journal = {Notices of the AMS},
  volume = 46,
  number = 2,
  pages = {203--213},
  year = 1999
}


%% reccomended limits of p-q
@misc{DSS2009,
  title={FIPS PUB 186-3: Digital Signature Standard},
  author={NIST},
  year=2009
}

%% here there's the descriptions for an efficient computation of fₚ(x) = y . y² ≡ x (mod p)
%% [openssl implements it]
@misc{ieee2001ieee,
  title = {IEEE P1363a D10 (Draft Version 10):
           Standard Specifications for Public Key Cryptography:
           Additional Techniques, IEEE P1363 Working Group, Working draft},
  author = {IEEE P1363 Working Group and others},
  year = 2001
}

@misc{rfc6176,
  title = {RFC6176: Prohibiting Secure Sockets Layer (SSL)
           Version 2.0},
  author = {S. Turner and T. Polk},
  publisher = {RFC Editor},
  url = {http://tools.ietf.org/html/rfc6176}
}

@misc{rfc4158,
  title = {RFC 4158: Certification Path Building},
  author = {M. Cooper and Y. Dzambasow and P. Hesse and S. Joseph and R. Nicholas},
  publisher = {RFC Editor},
  url = {http://tools.ietf.org/html/rfc4158}
}

@misc{rfc2246,
  title = {RFC 2246: The TLS protocol version 1.0},
  author = {T. Dierks and C. Allen},
  publisher = {RFC Editor},
  url = {https://www.ietf.org/rfc/rfc2246.txt}
}

@book{bombelli:algebra,
  title = {L'Algebra},
  author = {Rafael Bombelli},
  year = 1572,
  publisher = {Mathematical Association of America},
  url = {http://mathematica.sns.it/opere/9/}
}

@book{AOCPv2,
 author = {Knuth, Donald E.},
 title = {The Art of Computer Programming, Volume 2 (3rd Ed.):
          Seminumerical Algorithms},
 year = 1997,
 isbn = {0-201-89684-2},
 publisher = {Addison-Wesley Longman Publishing Co., Inc.},
 address = {Boston, MA, USA}
}

@book{MITalg,
  author = "T.~H. Cormen and C.~E. Leiserson and R.~L. Rivest and C.~Stein",
  edition = "3rd",
  publisher = "The MIT Press",
  title = "Introduction to Algorithms",
  year = 2009,
  isbn = "978-0-262-03384-8"
}

@book{Dijkstra:adop,
 author = {Dijkstra, Edsger Wybe},
 title = {A  Discipline of Programming},
 year = 1997,
 isbn = {013215871X},
 edition = {1st},
 publisher = {Prentice Hall PTR},
 address = {Upper Saddle River, NJ, USA},
}

@book{riesel,
 author = {Riesel, Hans},
 title = {Prime Numbers and Computer Methods for Factorization},
 year = 1985,
 isbn = {0-8176-3291-3},
 publisher = {Birkhauser Boston Inc.},
 address = {Cambridge, MA, USA},
}

@book{Crandall,
  author = {Richard Crandall and Carl Pomerance and Richard Crandall and Carl Pomerance},
  title = {Prime numbers: a computational perspective. Second Edition},
  year = {2005},
  isbn = {0-8176-3291-3},
  publisher = {Birkhauser Boston Inc.},
  address = {Cambridge, MA, USA}
}

@article{wiener,
 author = {Michael J. Wiener},
 title = {Cryptanalysis of short RSA secret exponents},
 journal = {IEEE Transactions on Information Theory},
 year = 1990,
 volume = 36,
 pages = {553--558},
 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.5261}
}

@article{sslpadding,
  author = {Serge Vaudenay},
  title = {Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS},
  booktitle = {Proceedings of In Advances in Cryptology - EUROCRYPT'02},
  year = {2002},
  pages = {534--546},
  publisher = {Springer-Verlag},
  url = {http://www.iacr.org/archive/eurocrypt2002/23320530/cbc02_e02d.pdf}
}

@article{pollard1974,
 author = {J. M. Pollard},
 title = {Theorems on factorization and primality testing},
 journal = {Mathematical Proceedings of the Cambridge Philosophical Society},
 volume = 76,
 issue = 03,
 month = 11,
 year = 1974,
 issn = {1469-8064},
 pages = {521--528},
 numpages = 8,
 doi = {10.1017/S0305004100049252},
 url = {http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=2074504}
}

@article{pollardMC,
  year={1975},
  issn={0006-3835},
  journal={BIT Numerical Mathematics},
  volume={15},
  number={3},
  doi={10.1007/BF01933667},
  title={A monte carlo method for factorization},
  url={http://dx.doi.org/10.1007/BF01933667},
  publisher={Kluwer Academic Publishers},
  author={Pollard, J.M.},
  pages={331-334},
  language={English}
}

@article{Williams:p+1,
  title = {A $p + 1$ Method of Factoring},
  author = {Williams, H. C.},
  journal = {Mathematics of Computation},
  volume = 39,
  number = 159,
  jstor_formatteddate = {Jul., 1982},
  pages = {pp. 225-234},
  url = {http://www.jstor.org/stable/2007633},
  ISSN = 00255718,
  language = {English},
  year = 1982,
  publisher = {American Mathematical Society},
}

@article{dixon,
  title = {Asymptotically Fast Factorization of Integers},
  author = {Dixon, John D.},
  journal = {Mathematics of Computation},
  volume = 36,
  number = 153,
  pages = {pp. 255-260},
  url = {http://www.jstor.org/stable/2007743},
  ISSN = 00255718,
  year = 1981
}


@article{pollard-brent,
  title = {An improved Monte Carlo Factorization algorithm},
  author = {Richard P. Brent},
  year=1980,
  issn={0006-3835},
  journal={BIT Numerical Mathematics},
  volume=20,
  number=2,
  url={http://dx.doi.org/10.1007/BF01933190},
  publisher={Kluwer Academic Publishers},
  pages={176-184},
  language={English}
}

@article{rsa,
 author = {Rivest, R. L. and Shamir, A. and Adleman, L.},
 title = {A Method for Obtaining Digital Signatures and Public-key Cryptosystems},
 journal = {Commun. ACM},
 issue_date = {Feb. 1978},
 volume = 21,
 number = 2,
 month = feb,
 year = 1978,
 issn = {0001-0782},
 pages = {120--126},
 numpages = 7,
 url = {http://doi.acm.org/10.1145/359340.359342},
 doi = {10.1145/359340.359342},
 acmid = 359342,
 publisher = {ACM},
 address = {New York, NY, USA}
}


@unpublished{SSLiverse,
  title= {Is the SSLiverse a safe place? An update on EFF's SSL Observatory project},
  author = {Jesse, Peter Eckersley},
  year = 2010,
  note = {[27c3]},
  url = {https://www.youtube.com/watch?v=DRjNV4YMvHI}
}


@article{morrison-brillhart,
  title={A method of factoring and the factorization of $\mathcal{F}_7$},
  author={Morrison, Michael A and Brillhart, John},
  journal={Mathematics of Computation},
  volume=29,
  number=129,
  pages={183--205},
  year=1975
}

@article{discretelogs,
  title={Discrete logarithms: The past and the future},
  author={Odlyzko, Andrew},
  journal={Towards a Quarter-Century of Public Key Cryptography},
  pages={59--75},
  year=2000,
  publisher={Springer US}
}


%% pollardrho parralelized.
@article{brent:parallel,
  title={Parallel algorithms for integer factorisation},
  author={Brent, Richard P},
  journal={Number Theory and Cryptography (edited by JH Loxton), London Mathematical Society Lecture Note Series},
  volume={154},
  pages={26--37},
  year={1990}
}


%% <3 thanks dude
@article{smeets,
  title={On continued fraction algorithms},
  author={Smeets, Ionica},
  year={2010},
  publisher={Mathematical Institute, Faculty of Science, Leiden University}
}