Euler Trap Doors and Public-Key Encryption

Part of the Springer Series in Information Sciences book series (SSINF, volume 7)


Secret Message Original Message Encrypt Message Baltic Coast Cryptographic System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Chapter 9

  1. 9.1
    N. J. A. Sloane: “Error-Correcting Codes and Cryptography,” in The Mathematical Gardener, ed. by D. Klarner (Prindle Weber Schmidt, Boston 1981) pp. 347–382. Republished in Cryptologica 6, 128–153, 258–278 (1982)Google Scholar
  2. 9.2
    A. G. Konheim: Cryptography: A Primer (Wiley, New York 1981)MATHGoogle Scholar
  3. 9.3
    W. Diffie, M. E. Hellman: Privacy and authentication: An introduction to cryptography. Proc. IEEE 67, 397–427 (1979)CrossRefGoogle Scholar
  4. 9.4
    J. J. Quisquater, C. Couvreur: Fast decipherment algorithm for RSA publickey cryptosystem. Electron. Lett. 18, 905–907 (1982)Google Scholar
  5. 9.5
    G. Brassard: A note on the complexity of cryptography. IEEE Trans. IT 25, 232–233 (1979)MathSciNetMATHCrossRefGoogle Scholar
  6. 9.6
    A. R. Meijer: Groups, Factoring, and Cryptography. Math. Mag. 69, 103–109 (1996)MathSciNetMATHGoogle Scholar
  7. 9.7
    C. S. Ogilvy: Through the Mathescope (Oxford University Press, London 1956), cited in M. Dekking, M. Mendés France, A. van der Poorten: Folds! Math. Intelligencer 4, 130–138 (1982)Google Scholar
  8. 9.8
    C. H. Meyer, S. Matyas: Cryptography: A New Dimension in Computer Data Security (Wiley, New York 1982)MATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Personalised recommendations