Next: fsqFsHn sGGousG
Up: Using Maple
Previous: Dealing with the Singularity
-
- DH76
-
W. Diffie and M. Hellman,
``New Directions in Cryptography'',
IEEE Transactions on Information Theory
IT-22 no.6 (1976), p. 644-654.
- Hil1
-
L. Hill,
``Cryptology in an Algebraic Alphabet'',
American Mathematical Monthly 36 (1929), p. 306-320.
- Hil2
-
L. Hill,
``Concerning the Linear Transformation Apparatus in Cryptography'',
American Mathematical Monthly 38 (1931), p. 135-154.
- HP
-
J. H. Humphreys & M. Y. Prest,
Numbers, Groups, and Codes.
Cambridge University Press, Cambridge. 1989.
- Kahn
-
D. Kahn,
The Codebreakers; The Comprehensive History of Secret Communication
from Ancient Times to the Internet.
Charles Scribner's Sons, New York. 1996.
- Kob
-
N. Koblitz,
A Course in Number Theory and Cryptography
(Graduate Texts in Mathematics, No 114). Springer-Verlag, New York. 1994.
- NZM
-
I. Niven, H. Zuckerman, H. Montgomery,
An Introduction to the Theory of Numbers,
John Wiley & Sons, New York. 1991.
- RSA
-
R. L. Rivest, A. Shamir and L. Adelman,
``A method for obtaining digital signatures and public-key cryptosystems'',
Communications of the ACM
21 (1978), p. 120-126.
- Ros
-
K. Rosen,
Elementary Number Theory and its Applications,
4th edition.
Addison-Wesley, Boston. 2000.
- Sch
-
B. Schneier,
Applied Cryptography: Protocols, Algorithms, and Source Code in C,
2nd edition.
John Wiley & Sons, New York. 1995.
Translated from LaTeX by Scott Sutherland
2002-08-29