1 |
K. Lee, "Use of algebraic theories in cryptography", Journal of Natural Sciences Sookmyung Women's University, Vol 14, pp. 43-48, 2003.
|
2 |
W. Diffie and M. Hellman, "New directions in cryptography", IEEE T. Inform. Theory, Vol. 22, pp. 644-654, 1976.
DOI
|
3 |
A. Odlyzko, "Discrete logarithms: the past and the future", Design. Code. Cryptogr., Vol. 19, pp. 129-145, 2000.
DOI
|
4 |
R. L. Rievest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures, and public-key cryptosystems", Commun. ACM, Vol. 21, pp. 120-126, 1978.
DOI
|
5 |
N. Koblitz, "A course in number theory and cryptography", 2nd ed., New York: Springer-Verlag, 1994.
|
6 |
A. K. Lenstra and E. R. Verheul, "The XTR public key system", in Advances in Cryptology-CRYPTO, New York: Springer-Verlag, pp. 1-19, 2000.
|
7 |
J. Koh, "Commutative algebra and cryp- tography", 2nd Conference on the Development of Public Key Cryptosystems, KISA, 1999.
|
8 |
M. F. Atiyah and I. G. Macdonald, "Intro- duction to commutative algebra", Boston: Addison-Wesley, 1969.
|
9 |
T.W. Hungerford, "Algebra", New York: Springer, 1980.
|