1 |
R. L. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital. Signatures and Public-Key Cryptosystems", Communications of the ACM vol. 21. pp 8-10, 1978
|
2 |
Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento A.C. 2002. Cyptography with Information Theoretic Security. Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct 2002.
|
3 |
Li, S., Zheng, X., 2002. On the Security of an Image Encryption Method. ICIP2002.
|
4 |
Menezes, A. J., P.C. Van Oorschot, S.A. Van Stone. 1996.Handbook of Applied Cryptography. CRC press.
|
5 |
Overbey, J., Traves, W., Wojdylo, J., 2005. On the keyspace of the Hill cipher. Cryptologia, 29(1):59-72.
DOI
|
6 |
A. Diffie, M. E. Hellman, ''New directions in cryptography", IEEE Trans. Inf. Theory IT-26, no. 6., pp. 644-654, 1976
|
7 |
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm, International Journal of Security, Vol 1, Issue 1, 2007, pp. 14-21.
|
8 |
P.W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring", Proceedings, 35th Annual Symposium on Fundamentals of Computer Science (FOCS), pp. 124-134.. 1994
|
9 |
Tom M. Apostol, "Calculus", Volume 1, Blaisdell Publishing Company, pp 422-423, 1962
|
10 |
Brian S. Thomson, Andrew M. Bruckner, "Elementary Real Analysis Second Edition", CreateSpace, pp 85, 2008
|
11 |
O.Elkeelany, M.M.Matalgah, K.P.Sheikh , M.Thaker, G.Chaudhry, D.Medhi, J.Qaddour, ""Performance Analysis of IPSec Protocol: Encryption and Authentication"", 1164-1168, IEEE 2002
|
12 |
Alan O.Freier, Philip Karlton, Paul C.Kocher, "he SSL Protocol Version 3.0" Internet-Draft, November 1996
|