References
- ASCII Table. https://www.asciitable.com. Accessed 21 May 2023.
- Canteaut, A. 2017. Lecture Notes on Error-Correcting Codes and their Applications to Symmetric Cryptography. https://www.paris.inria.fr/secret/Anne.Canteaut/MPRI/chapters-10-13.pdf.Accessed 27 June 2023.
- Gallian, J. A. 2006. Contemporary Abstract Algebra, Sixth Edition. Boston, MA: Houghton Mifflin.
- Kaur, M. 2008. Cryptography as a pedagogical tool. PRIMUS. 18(2): 198–206. doi: 10.1080/10511970701298833
- Koblitz, N. 1994. A Course in Number Theory and Cryptography, Graduate Texts in Mathematics 114. New York, NY: Springer-Verlag.
- Koblitz, N. 1997. Cryptography as a teaching tool. Cryptologia. 21(4): 317–326. doi: 10.1080/0161-119791885959
- Koblitz, N. 1998. Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics, Vol. 3. Berlin: Springer-Verlag.
- Lewand, R. E. 2000. Cryptological Mathematics, Classroom Resource Materials, Vol. 16. Washington, DC: Mathematical Association of America.
- Lidl, R. and H. Niederreiter. 1994. Polynomials over finite fields. In Introduction to Finite Fields and their Applications. Cambridge: Cambridge University Press.
- Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Edition. John Wiley & Sons, Inc.
- van Tilborg, H. C. A. 1988. An Introduction to Cryptology, First Edition. Kluwer Academic Publishers.
- Wolfram Alpha LLC. 2022. Wolfram|Alpha. WolframAlpha [QuotientRemainder(x7−1, x3+x+1), https://www.wolframalpha.com/input?i=QuotientRemainder%28x%5E7-1%2Cx%5E3%2Bx%2B1%29]. Accessed 24 January 2023.
- Young, A. 2006. Mathematical Ciphers from Caesar to RSA, Mathematical World Series, Vol. 25. Providence, RI: American Mathematical Society.