References
[I ]. N. Koblifz, "Algebraic Aspects of Cryptography:
Algorithms and Computation in Mathematics", Springer-4
[2]. T. ElGamaI, "A Public Key Cryptosystem and a
Signature Scheme based on Discrete Logarithms", IEEE
Transactions on Information Theory, Vol, 31, pp, 472-496,
1985
[3]. S. Goldwasser and S. Micali, "Probabilistic
Encryption", Journal of Computer and System Science,
Vol. 28, pp. 270-299, 198
[4]. Richard E. Smith, "Internet Cryptography", Addison-
Wesley, 1999
[5]. S. Singh, "The Code Book The Science of Secrecy
from Ancient Egypt to Quantum Cryptography", Fourth
Estate, Landon, 1999
[6]. L. M. Adleman, "A Subexponential Algorithmic for the
Discrete Logarithm Problem with Application to
Cryptography", Proceedings of the 2Ofh Annual IEEE
Symposium on Foundations of Computer Science, IEEE
Press, pp, 55-60, 1979
[7]. H. Wiener, "Cryptanalysls of Short RSA Secret
Exponents" , IEEE Transactions on information Theory, Vol.
36, pp, 553-558, 1990
[8]. W. Diffie and E. Hellman, "New Directions in
Cryptography", IEEE Transactions on Information Theory,
Vol. 22, pp. 644-654, 1976
[9]. Ravi Kalakofa and Andrew 8. Whinston, "Frontiers of
Electronic Commerce" , Addison-Wesley, I 999