1. Anshel, I., Anshel, M., Goldfeld, D.: An algebraic method for public-key cryptography. Math. Res. Lett. 6, 287–291 (1999)
2. Cannon, J.W., Floyd, W.J., Parry, W.R.: Introductory notes on Richard Thompson’s groups. L’Enseignement Mathematique 42(2), 215–256 (1996)
3. Lecture Notes in Computer Science;J.C. Cha,2001
4. Lecture Notes in Computer Science;D. Hofheinz,2002
5. Hughes, J., Tannenbaum, A.: Length-based attacks for certain group based encryption rewriting systems, Workshop SECI02 Securitè de la Communication sur Intenet, Tunis, Tunisia (September 2002),
http://www.storagetek.com/hughes/