1: \providecommand{\bysame}{\leavevmode\hbox to3em{\hrulefill}\thinspace}
2: \providecommand{\MR}{\relax\ifhmode\unskip\space\fi MR }
3: % \MRhref is called by the amsart/book/proc definition of \MR.
4: \providecommand{\MRhref}[2]{%
5: \href{http://www.ams.org/mathscinet-getitem?mr=#1}{#2}
6: }
7: \providecommand{\href}[2]{#2}
8: \begin{thebibliography}{10}
9:
10: \bibitem{crypto98}
11: Ronald Cramer and Victor Shoup, \emph{A practical public key cryptosystem
12: provably secure against adaptive chosen ciphertext attack}, CRYPTO '98, LNCS,
13: no. 1462, 1998, pp.~13--25.
14:
15: \bibitem{GAP4}
16: The GAP~Group, \emph{{GAP -- Groups, Algorithms, and Programming, Version
17: 4.4}}, 2006, \verb+(http://www.gap-system.org)+.
18:
19: \bibitem{menezes-koblitz}
20: Neal Koblitz and Alfred~J. Menezes, \emph{Another look at {"Provable
21: Security"}}, Tech. report, http://eprint.iacr.org/2004/152, 2004.
22:
23: \bibitem{asiacrypt2004}
24: In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Soek Kwak, and Yoo-Jin
25: Baek, \emph{On the security of {MOR} public key cryptosystem}, Asiacrypt 2004
26: (P.J.Lee, ed.), LNCS, no. 3329, Springer-Verlag, 2004, pp.~387--400.
27:
28: \bibitem{levchuk}
29: V.M. Levchuk, \emph{Connection between the unitriangular group and certain
30: rings. chap 2: The group of automorphisms}, Siberian Mathematical Journal
31: \textbf{24} (1983), no.~3, 543--557.
32:
33: \bibitem{maginnis}
34: J.S. Maginnis, \emph{Outer automorphisms of upper triangular matrices}, Journal
35: of Algeba \textbf{161} (1993), 267--270.
36:
37: \bibitem{thesis}
38: Ayan Mahalanobis, \emph{Diffie-hellman key exchange protocol, its
39: generalization and nilpotent groups}, Ph.D. thesis, Florida Atlantic
40: University, 2005, http://eprint.iacr.org/2005/223.
41:
42: \bibitem{menezes}
43: Alfred Menezes and Scott Vanstone, \emph{A note on cyclic groups, finite fields
44: and the discrete logarithm problem}, Applicable Algebra in Engineering,
45: Communication and Computing \textbf{3} (1992), 67--74.
46:
47: \bibitem{menezes1}
48: Alfred Menezes and Yi-Hong Wu, \emph{The discrete logarithm problem in
49: {GL}$(n,q)$}, Ars Combinatorica \textbf{47} (1997), 23--32.
50:
51: \bibitem{odoni}
52: R.~Odoni, V.~Varadharajan, and R.~Sanders, \emph{Public key distribution in
53: matrix rings}, Electronic Letters \textbf{20} (1984), 386--387.
54:
55: \bibitem{paeng}
56: Seong-Hun Paeng, \emph{On the security of cryptosystem using automorphism
57: groups}, Information Processing Letters \textbf{88} (2003), 293--298.
58:
59: \bibitem{crypto2001}
60: Seong-Hun Paeng, Kil-Chan Ha, Jae~Heon Kim, Seongtaek Chee, and Choonsik Park,
61: \emph{New public key cryptosystem using finite non-abelian groups}, Crypto
62: 2001 (J.~Kilian, ed.), LNCS, vol. 2139, Springer-Verlag, 2001, pp.~470--485.
63:
64: \bibitem{sims}
65: Charles~C. Sims, \emph{Computation with finitely presented groups}, Cambridge
66: University Press, 1994.
67:
68: \bibitem{tobias}
69: Christian Tobias, \emph{Security analysis of the {MOR} cryptosystem}, PKC2003,
70: LNCS, no. 2567, Springer-Verlag, 2002, pp.~175--186.
71:
72: \bibitem{weir}
73: A.J. Weir, \emph{Sylow $p$-subgroup of the general linear group over finite
74: fields of characteristic $p$}, Proceedings of the American Mathematical
75: Society \textbf{6} (1955), no.~3, 454--464.
76:
77: \end{thebibliography}
78: