next up previous
Next: fsqFsHn sGGousG Up: Using Maple Previous: Dealing with the Singularity

Bibliography

DH76
W. Diffie and M. Hellman, ``New Directions in Cryptography'', IEEE Transactions on Information Theory IT-22 no.6 (1976), p. 644-654.

Hil1
L. Hill, ``Cryptology in an Algebraic Alphabet'', American Mathematical Monthly 36 (1929), p. 306-320.

Hil2
L. Hill, ``Concerning the Linear Transformation Apparatus in Cryptography'', American Mathematical Monthly 38 (1931), p. 135-154.

HP
J. H. Humphreys & M. Y. Prest, Numbers, Groups, and Codes. Cambridge University Press, Cambridge. 1989.

Kahn
D. Kahn, The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet. Charles Scribner's Sons, New York. 1996.

Kob
N. Koblitz, A Course in Number Theory and Cryptography (Graduate Texts in Mathematics, No 114). Springer-Verlag, New York. 1994.

NZM
I. Niven, H. Zuckerman, H. Montgomery, An Introduction to the Theory of Numbers, John Wiley & Sons, New York. 1991.

RSA
R. L. Rivest, A. Shamir and L. Adelman, ``A method for obtaining digital signatures and public-key cryptosystems'', Communications of the ACM 21 (1978), p. 120-126.

Ros
K. Rosen, Elementary Number Theory and its Applications, 4th edition. Addison-Wesley, Boston. 2000.

Sch
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition. John Wiley & Sons, New York. 1995.




Translated from LaTeX by Scott Sutherland
2002-08-29