References
- D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2): 203–213, 1999.
- D. Boneh, An. Joux, and P. Q. Nguyen. Why textbook Elgamal and RSA encryption are insecure. In International Conference on the Theory and Application of Cryptology and Information Security, pages 30–43. Springer, 2000.
- J. Katz and Y. Lindell. Introduction to Modern Cryptography. CRC Press, 2014.
- C. Meshram and X. Li. New efficient key authentication protocol for public key cryptosystem using dl over multiplicative group. Journal of Information and Optimization Sciences, 39(2): 391–400, 2018. doi: https://doi.org/10.1080/02522667.2017.1411013
- R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2): 120–126, 1978. doi: https://doi.org/10.1145/359340.359342
- K. H. Rosen. Elementary Number Theory. Pearson Education, 2011.
- P. Sundarayya and G. Vara Prasad. A public key cryptosystem using affine hill cipher under modulation of prime number. Journal of Information and Optimization Sciences, 40(4): 919–930, 2019. doi: https://doi.org/10.1080/02522667.2018.1470751