References
- K. Lee, "Use of algebraic theories in cryptography", Journal of Natural Sciences Sookmyung Women's University, Vol 14, pp. 43-48, 2003.
- W. Diffie and M. Hellman, "New directions in cryptography", IEEE T. Inform. Theory, Vol. 22, pp. 644-654, 1976. https://doi.org/10.1109/TIT.1976.1055638
- A. Odlyzko, "Discrete logarithms: the past and the future", Design. Code. Cryptogr., Vol. 19, pp. 129-145, 2000. https://doi.org/10.1023/A:1008350005447
- R. L. Rievest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures, and public-key cryptosystems", Commun. ACM, Vol. 21, pp. 120-126, 1978. https://doi.org/10.1145/359340.359342
- N. Koblitz, "A course in number theory and cryptography", 2nd ed., New York: Springer-Verlag, 1994.
- A. K. Lenstra and E. R. Verheul, "The XTR public key system", in Advances in Cryptology-CRYPTO, New York: Springer-Verlag, pp. 1-19, 2000.
- J. Koh, "Commutative algebra and cryp- tography", 2nd Conference on the Development of Public Key Cryptosystems, KISA, 1999.
- M. F. Atiyah and I. G. Macdonald, "Intro- duction to commutative algebra", Boston: Addison-Wesley, 1969.
- T.W. Hungerford, "Algebra", New York: Springer, 1980.