1. Anshel, I., Anshel, M., Goldfeld, D., Lemieux, S.: Key agreement, the Algebraic Eraser, and lightweight cryptography. Algebraic Methods in Cryptography, Contemp. Math. Amer. Math. Soc. 418, 1–34 (2006)
2. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)
3. Habeeb, M., Kahrobaei, D., Shpilrain, V.: A public key exchange using semidirect products of groups (extended abstract). In: Proceedings of the International Conference in Symbolic Computations and Cryptography, SCC 2010, Royal Holloway, University of London, Egham, United Kingdom (June 2010)
4. Kahrobaei, D., Koupparis, C., Shpilrain, V.: Public key exchange using matrices over group rings, Groups, Complexity, and Cryptology (to appear),
http://arxiv.org/abs/1302.1625
5. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC-Press (1996)