References
- Diffie , W. and Hellman , M. E. 1976 . New directions in cryptography . IEEE Trans, on Inf. Theory , 22 : 644 – 654 .
- Rivest , R. L. , Shamir , A. and Adleman , L. 1978 . A method for obtaining digital signatures and public key cryptosystems . Comm. ACM , 21 ( 2 ) : 120 – 126 .
- Diffie , W. and Hellman , M. E. 1979 . Privacy and authentication: An introduction to cryptography . Proc. IEEE , 67 ( 3 )
- Davies D. Limits to computations London NPL note
- Van der Waerden , B. L. 1949 . Modern Algebra , 1 ( 2 )
- Dickson , L. E. 1958 . Linear Groups with an Exposition of the Galois Field Theory , Dover Pub .
- Albert , A. A. 1956 . Fundamental Concepts of Higher Algebra , The University of Chicago Press .
- Varadharajan V Some Cryptographic Techniques for Secure Data Communication Ph. D. Thesis, CNAA 1984
- Varadharajan , V. and Odoni , R. August 1984 . “ Extension of RSA cryptosystem to matrix rings ” . In Cryptologia August , Accepted for publication
- Knuth , D. E. 1981 . The Art of Computer Programming Seminumerical Algorithms , Vol. 2 , Addison-Wesley .
- Kravitz , D. W. and Reed , I. S. 1982 . Extension of RSA cyryptostructure: A Galois approach . IEE Electronic Letters , 18 ( 6 ) : 255 – 256 .
- Berlekamp , E. R. 1970 . Factoring polynomials over large finite fields . Maths, of Computation , 24 ( 111 ) : 713 – 735 .