Next: fsqFsHn sGGousG
 Up: Using Maple
 Previous: Dealing with the Singularity
 
- 
 - DH76
 - 
W. Diffie and M. Hellman,
``New Directions in Cryptography'',
IEEE Transactions on Information Theory 
IT-22 no.6 (1976), p. 644-654.
 - Hil1
 - 
L. Hill,
``Cryptology in an Algebraic Alphabet'',
American Mathematical Monthly 36 (1929), p. 306-320.
 - Hil2
 - 
L. Hill,
``Concerning the Linear Transformation Apparatus in Cryptography'',
American Mathematical Monthly 38 (1931), p. 135-154.
 - HP
 - 
J. H. Humphreys & M. Y. Prest,
Numbers, Groups, and Codes.
Cambridge University Press, Cambridge. 1989.
 - Kahn
 - 
D. Kahn,
The Codebreakers; The Comprehensive History of Secret Communication
from Ancient Times to the Internet.
Charles Scribner's Sons, New York. 1996.
 - Kob
 - 
N. Koblitz,
A Course in Number Theory and Cryptography
(Graduate Texts in Mathematics, No 114). Springer-Verlag, New York. 1994.
 - NZM
 - 
I. Niven, H. Zuckerman, H. Montgomery,
An Introduction to the Theory of Numbers,
John Wiley & Sons, New York. 1991.
 - RSA
 - 
R. L. Rivest, A. Shamir and L. Adelman,
``A method for obtaining digital signatures and public-key cryptosystems'',
Communications of the ACM 
21 (1978), p. 120-126.
 - Ros
 - 
 K. Rosen,
Elementary Number Theory and its Applications,
4th edition.
Addison-Wesley, Boston. 2000.
 - Sch
 - 
B. Schneier,
Applied Cryptography: Protocols, Algorithms, and Source Code in C,
2nd edition.
John Wiley & Sons, New York.  1995.
 
Translated from LaTeX by Scott Sutherland 
2002-08-29