You are on page 1of 4

RSA PUBLIC KEY

CRYPTOGRAPHY

Jorge Gonzalez

Jorge Gonzalez
Internet Literacy Class
Annotated Bibliography (MLA format)
Koblitz, N. (1998). A Course in Nuber Theory and Cryptography 2nd ed. New York: Springer.
This book covers number theory and cryptography. A section is devoted to RSA encryption and brief
overview of crypto systems.
This source is part of my private library on Mathematics and Computer Science, and was located by a
physical real life search of my private library/modest collection; no search engine required. It was the
text book used in an upper division class I took on cryptography at U.C.S.C.
The author is a well-known mathematician with many published works in mathematical journals and
was a professor of mathematics at a prestigious university the work he has done in the field of
mathematics and cryptography is impeccable.
The information is scholarly and up to the highest standard of academic institutions. The work is known
to be precise and correct and has been vetted and verified by many scholars. The information on crypto
systems directly relates to the topic of my research paper and is a direct source. This source is not bias
since the information is factual and not based on opinions but factual research.

Rosen, K. H. (2005). Elementary Number Theory and it's applications 5th ed. Boston: Pearson Addison
Wesley.
The text book is on numbers theory and has characters on cyphers, block and stream cyphers and other
crypto systems covered as well as theories of on modern cryptography.
This source is also part of my private collection of text books on mathematics and Computer Science no
search engine was required. I searched through my lecture notes for the best text book on the subject
and found this book to be a good match for the research paper.
The author is a well-known mathematician and thought numbers theory at a prestigious university. Also
has published work in mathematical journals.
The work is a primary scholarly work that has been used for university classes on numbers theory. The
theories used in the text have been tested and proven true. The work in this source is not bias its based
on facts and mathematical theories that have been tested and found to be true.

Vinogradov, I. M. (1954). Elements of Number Theory. Mineola, New York: Dover Publications, Inc.
Elementary numbers theory and the theories proved in this text book directly relate to the thesis of my
research paper. Many of the concept covered here are key to supporting my thesis on cryptography.
This text book is also part of my private collection of text books on Mathematics and Computer Science.
I searched my lecture notes for the best possible choice for sources for my research project and this
textbooks notes seemed like the best choice so it was a real life search not a search engine.

1
Annotated Bibliography

Jorge Gonzalez
Internet Literacy Class
Professor Vinogradov is a published mathematician that has many published articles and books his
works in the fields of numbers theory and cryptography is used in many universities mathematics
departments. The source is sound and scholarly and unbiased since it covers factual information that
has been proven to be true and is actually used by some mathematics departments to teach numbers
theory.

Cerf, V. G. (2013). There Is Nothing New Under the Sun. Communications of the ACM, p7.
This source covers some of the history of cryptography and older cryptosystems are covered as well as
how older cryptosystems can be defeated. Stresses the fact that cryptosystems are inherently defeat
able because of their mathematical composition meaning some crypto systems are flawed.
This journal was located through an EBSCOhost using keyword Boolean search of Cryptography and
history. This was a search of a scholarly journal on cryptography and mathematics.
This source a scholarly. Its from an article in a scholarly STEM journal the article is known for publishing
accurate works on mathematics and cryptographer. The author is a known person he is considered one
of the fathers of the internet an American pioneer in communications technology. His intellect and
work is renowned and respected in many academic communities.

Sqosito, Sean. "Did NSA Spy with This?" San Fransico Chronicle [San Fransico] 22 Oct. 2015: 5. Print.
This source is relevant to my research paper because it covers security and cryptography. The use of
data collection and cryptosystems is covered. Modern use of RSA encryption and privacy is covered and
this is relevant to my research paper.
This source was found in Newsbank data base with a Boolean search of Cryptography and security
Author is not a known mathematician or cryptographer but does a decent job of giving an overview of
what cryptosystems are like today and covers information systems.
This is a non-scholarly source and a secondary source reporting on data gathering technology. Some bias
is shown and the article is alarmist in its tone.

Suzuki, J. (2002). A History of Mathematics. Upper Saddle River, New Jersey: Prentice-Hall.
This source is relevant to my research paper because it covers older cryptosystems and their evolution
leading to modern cryptosystems. Also covers how some cryptosystems were defeated and how newer
cryptosystems may be defeated.
This source is part of my personal collection of Mathematics and Computer Science. I searched for it the
old fashioned way no search engine needed just went through my notes on cryptography.

2
Annotated Bibliography

Jorge Gonzalez
Internet Literacy Class
The author is a well-known mathematician and the textbook is used to teach classes in universities for
classes on classical mathematics and geometry. The source is direct and not bias. Factual information on
mathematics.

3
Annotated Bibliography

You might also like