References
- D. Bernstein, J. Buchmann, E. Dahmen, Post-Quantum cryptography, Springer, 2009.
- T. Hanoymak, Ö. Küsmüs, On construction of cryptographic systems over units of group rings, Int. Electron. J. Pure Appl. Math., 9(1), 2015, 37–43.
- J. Hoffstein, J. Pipher, J. H. Silverman, An introduction of mathematical cryptography, Springer, 2008.
- T. Hurley, Group rings for communications, Int. J. Group Theory, 4(4), 2015, 1–23.
- B. Hurley, T. Hurley, Group ring cryptography, Int. J. Pure Appl. Math., 69(1), 2011, 67–86.
- S. Inam, R. Ali, A new ElGamal-like cryptosystem based on matrices over groupring, Neural Comput. & Applic., doi: https://doi.org/10.1007/s00521-016-2745-2.
- S. Kumar, S. Kumar, G. Mittal, S. Narain, A vector space approach to generate dynamic keys for Hill cipher, Preprint, https://arxiv.org/abs/1909.06781.
- C. P. Milies, S. K. Sehgal, An Introduction to Group Rings, Klumer, 2002.
- GAP, Groups, Algorithms, Programming, https://www.gap-system.org.
- C. Meshram, X. Li, New efficient key authentication protocol for public-key cryptosystem using DL over multiplicative group, Journal of Information and Optimization Sciences, 39(2), 2018, 391–400. doi: https://doi.org/10.1080/02522667.2017.1411013
- G. Mittal, S. Kumar, S. Narain, S. Kumar, Group rings based public-key cryptosystems, Journal of discrete mathematical sciences and cryptography, DOI: https://doi.org/10.1080/09720529.2020.1796868.
- J. Proos, C. Zalka, Shor’s discrete logarithm quantum algorithm for elliptic curves, https://arxiv.org/pdf/quant-ph/0301141.pdf, 2003.
- V. Romankov, Two general schemes of algebraic cryptography, Groups Complex. Cryptol., doi:https://doi.org/10.1515/gcc-2018-0009.
- S. K. Rososhek, Cryptosystems in automorphism groups of group rings of abelian groups, J. Math. Sci. (N.Y.), 154(3), 2008, 386–391. doi: https://doi.org/10.1007/s10958-008-9168-2
- P. Shor, Algorithms for quantum computation discrete logarithms and factoring, https://arxiv.org/pdf/quant-ph/9508027.pdf, 1994.
- P. Sundarayya, G. Vara Prasad, A public-key cryptosystem using affine Hill cipher under modulation of prime number, Journal of Information and Optimization Sciences, 40(4), 2019, 919–930. doi: https://doi.org/10.1080/02522667.2018.1470751