0c1a57dd989652d5.tex
1: \begin{thebibliography}{9}
2: %
3: \bibitem{hill} Hill L. S. \emph{The American Mathematical Monthly} \textbf{38}, No. 3, 135 (1931).
4: 
5: \bibitem{ayan1} Mahalanobis A., \emph{Intern. Math. Forum} \textbf{8}, No. 39, 1939 (2013).
6: 
7: \bibitem{higham1} Higham N.J. and  Lijing Lin, \emph{Linear Algebra and its Applications},  
8: \textbf{435}, 448 (2011).
9: 
10: \bibitem{diffie}  Diffie W. and Hellman M.E.,  \emph{IEEE Transactions on Information Theory} 
11: \textbf{IT22}, 644 (1976).
12: 
13: \bibitem{RSA} Rivest R.L., Shamir A., and Adleman L., \emph{Comm. Assoc. Comput. Mach.
14: } \textbf{21}, 120 (1978).
15: 
16: \bibitem{BB84} Bennett C.H. and Brassard G., \emph{Proceedings of IEEE 
17: International Conference on Computers, Systems and Signal Processing} \textbf{175} 8, New York (1984).
18: 
19: \bibitem{copper} Coppersmith D. and Winograd S., \emph{J. Symbolic Computation} \textbf{9}, 251 (1990)
20: 
21: \bibitem{knuth1} Knuth D.E., \emph{The Art of Computer Programming}, Vol. II, p. 229, 
22: 3th Edition, Addison Wesley, 1997.
23: 
24: \bibitem{knuth2} idem p. 356. 
25: 
26: \bibitem{khinchin} Khinchin A. Ya., \emph{Continued Fractions}, Dover Publications, 
27: Mineola, N.Y., 1992.
28: 
29: \bibitem{singh} According to Simon Singh in his page 
30: https://simonsingh.net/media/articles/maths-and-science/unsung-heroes-of-cryptography/
31: 
32: \bibitem{adrian} Adrian D. et al., \emph{Imperfect Forward Secrecy: 
33: How Diffie-Hellman Fails in Practice}, in the {22nd ACM Conference on Computer 
34: and Communications Security, October 12-16, 2015}, Denver, Colorado, US, 
35: DOI: http://dx.doi.org/10.1145/2810103.2813707
36: 
37: \bibitem{cohn} Cohn H., \emph{Advanced Number Theory}, Dover Publications Inc., 
38: New York, 1980.
39: 
40: 
41: %
42: \end{thebibliography}
43: