References
I. Anshel, M. Anshel, D. Goldfeld, An algebraic method for public-key cryptography.Math. Res. Lett. 6 (1999), 287–291.
Menezies, van Oorschot and Vanstone,Handbook of Applied Cryptography, CRC Press 1997.
A. Joux, Multicollisons in iterated hash functions. Application to cascaded constructions,Advances in Cryptology-CRYPTO 2004, Lecture Notes in Computer Science 3152, Springer-Verlag, 2004, 306–316.
P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,Advances in Cryptology-CRYPTO 96, Lecture Notes in Computer Science 1109, Springer-Verlag, 1996, 104–113.
U. Maurer, Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms,Advances in Cryptology-Crypto ’94, Lecture Notes in Computer Science 839, Springer-Verlag, 1994, 271–281.
B. Schneier,Applied Cryptography, 2nd edition, John Wiley, 1996.
X. Wang, Y. Yin, H. Yu, Finding collisions in the Full SHA-1,Advances in Cryptology- Crypto 2005, Lecture Notes in Computer Science 3621, Springer-Verlag, 17–36.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Anshel, M., Boklan, K.D. Introduction to cryptography with coding theory, second edition. The Mathematical Intelligencer 29, 66–69 (2007). https://doi.org/10.1007/BF02985694
Published:
Issue Date:
DOI: https://doi.org/10.1007/BF02985694