Skip to main content
Logo image

PreTeXt Sample Book: Abstract Algebra (SAMPLE ONLY)

References 2.8 References and Suggested Readings

View Source for references
<references>
  <title>References and Suggested Readings</title>


  <biblio type="raw">
    Koblitz, N.
    <title>A Course in Number Theory and Cryptography</title>.
    2nd ed. Springer, New York, 1994.
  </biblio>

  <biblio type="raw" xml:id="biblio-pomerance-1990">
    Pomerance, C.
    <q>Cryptology and Computational Number Theory<mdash />An Introduction,</q>
    in
    <title>Cryptology and Computational Number Theory</title>,
    Pomerance, C., ed. Proceedings of Symposia in Applied Mathematics, vol. 42, American Mathematical Society, Providence, RI, 1990.  This book gives an excellent account of how the method of repeated squares is used in cryptography.
  </biblio>
</references>
View Source for biblio
<biblio type="raw">
  Koblitz, N.
  <title>A Course in Number Theory and Cryptography</title>.
  2nd ed. Springer, New York, 1994.
</biblio>
[1]
Koblitz, N. A Course in Number Theory and Cryptography. 2nd ed. Springer, New York, 1994.
View Source for biblio
<biblio type="raw" xml:id="biblio-pomerance-1990">
  Pomerance, C.
  <q>Cryptology and Computational Number Theory<mdash />An Introduction,</q>
  in
  <title>Cryptology and Computational Number Theory</title>,
  Pomerance, C., ed. Proceedings of Symposia in Applied Mathematics, vol. 42, American Mathematical Society, Providence, RI, 1990.  This book gives an excellent account of how the method of repeated squares is used in cryptography.
</biblio>
[2]
Pomerance, C. “Cryptology and Computational Number Theory—An Introduction,” in Cryptology and Computational Number Theory, Pomerance, C., ed. Proceedings of Symposia in Applied Mathematics, vol. 42, American Mathematical Society, Providence, RI, 1990. This book gives an excellent account of how the method of repeated squares is used in cryptography.