[1]
M. K. Hani, H. Y. Wen, and A. Paniandi, “Design and Implementation of a Private and Public Key Crypto Processor for Next-Generation IT Security Applications”, MJCS, vol. 19, no. 1, pp. 29–45, Jun. 2006.