Skip to main content
Logo image

References Bibliography

[3]
ElGamal, Taher, A public key cryptosystem and a signature scheme based on discrete logarithms, Institute of Electrical and Electronics Engineers. Transactions on Information Theory, 31, (1985), no. 4, 469-472, http://dx.doi.org/10.1109/TIT.1985.1057074
[5]
Euclid, The thirteen books of Euclid’s Elements, Translated with introduction and commentary by Thomas L. Heath, 2nd ed, Dover Publications, Inc., New York, (1956)
[6]
Gauss, Carl Friedrich, Disquisitiones arithmeticae Translated and with a preface by Arthur A. Clarke, Revised by William C. Waterhouse, Cornelius Greither and A. W. Grootendorst and with a preface by Waterhouse, Springer-Verlag, New York, (1986)
[7]
Rivest, R. L. and Shamir, A. and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Communications of the Association for Computing Machinery, 21, (1978), no. 2, 120-126, http://dx.doi.org/10.1145/359340.359342
[8]
Weber, H., Leopold Kronecker, Jahresbericht der Deutschen Mathematiker Vereinigung, 2, (1891), 5-31
[9]
Merkle, Ralph C, Secure Communications Over Insecure Channels, Communications of the ACM, 21, (1978), no. 4, 294-299