Литература
Afrati F. Introduction to the theory of information (in Greek). National Technical University of Athens, Greece, 1985.
Berlekamp E.R. Algebraic coding theory. McGraw-Hill, New York, 1968. [Имеется перевод: Берлекэмп Э. Алгебраическая теория кодирования, fyl.: Мир, 1974.]
Blake I.F. Codes and designs. Mathematics Magazine 52, 81-95, 1979.
Blakley G.R., Borosh I. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Computers and Mathematics with Applications 5, 169-178, 1979.
Bose R.C., Ray-Chaudhuri D.K. On a class of error correcting binary group codes. Information and Control 3, 68-79, 279-290, 1960.
Childs L. A concrete introduction to higher algebra. Springer-Verlag, New York, 1979.
Diffie W., Heilman M.E. New directions in cryptography. IEEE transactions on Information Theory IT-22, 644-654, 1976.
Diffie W., Heilman M.E. Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10, 74-84, June 1977.
Ecker A. Ueber die mathematis einiger ChifFrierverfahren. Computing 29, 277-287, 1982.
Feistel H. Cryptography and computer privacy. Scientific American 228, 15-23, May 1973.
Gass F. Solving a Jules Verne cryptogram. Mathematics Magazine 59, 3-11, 1986.
Hamming R.W. Error detecting and error correcting codes. Bell System Technical Journal 29, 147-150, 1950.
Heilman M.E. The mathematics of public-key cryptography. Sctntific American 241, 130-139, August 1979.
Herlestam T. Critical remarks on some public-key cryptosystems. BIT 18, 493-496, 1978.
Hill L.S. Cryptography in an algebraic alphabet. American Mathematical Monthly 36, 306-312, 1929.
Hill L.S. Concerning certain linear transformation apparatus of cryptography. American Mathematical Monthly 38, 135-154, 1931.
Hocquenghem A. Codes correcteurs d’erreurs. Chiffres 2, 147-156, 1959.
Kahn D. The Codebreakers. MacMillan, New York, 1967.
Krishnamurthy E.V., Ramachandran V. A cryptographic system based on finite field transforms. Proceedings of the Indian Academy of Sciences (Math. Sci.) 89, 75-93, 1980.
Lempel A. Cryptology in transition. ACM Computing Surveys 11, 280-303, 1979.
Levinston N. Coding theory: a counter to G.H. Hardy’s conception of applied mathematics. American Mathematical Monthly 77, 249-258, 1970.
Lewis H.R., Papadimitriou C.H. The efficiency of algorithms. Scientific American, 96-109, January 1978.
Lidl R., Pilz G. Applied abstract algebra. Springer-Verlag, New York, 1984.
Mackiw G. Applications of abstract algebra. Wiley, New York, 1985.
MacWilliams F.J., Sloane N.J.A. The theory of error-correcting codes, Part I and II. North-Holland, New York, 1977.
Merkle R.C. Secure communications over insecure channels. Communications of the ACM 21, 294-299, April 1978.
Merkle R.C., Heilman M.E. Hiding information and signatures in trapdoor knapsacks. IEEE Transactions on Information Theory IT-24, 525-530, 1978.
Merkle R.C., Heilman M.E. On the security of multiple encryption. Communications of the ACM 24, 465-467, July 1981.
Peterson W.W., Weldon E.J. Error-correcting codes, 2 ed. MIT press, Cambridge MA, 1972.
Pohlig S.С., Heilman M.E. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory IT-24, 106-110, 1978.
Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21, 120-126, February 1978.
Shannon C.E. A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 623-656, 1948.
Shannon C.E. Communication theory of secrecy systems. Bell System Technical Journal 28, 656-715, 1949.
Simmons G.J. Cryptology: The mathematics of secure communication. Mathematical Intelligencer 1, 233-246, 1979.
Sinkov A. Elementary cryptanalysis — a mathematical approach. The New Mathematical Library no. 22, Mathematical Association of America, Washington, D.C., 1968.
Wakerly J. Error detecting codes, self-checking circuits and applications. North-Holland, New York, 1978.
Williams H.C., Schmid B. Some remarks concerning the M.I.T. public-key cryptosystem. BIT 19, 525-538, 1979.