1I. Anshel , M. Anshel, D. Goldfeld, An Algebraic Method for Public-Key Cryptography, Mathematical Research Letters, 6 (1999), 1-5.
2M. Banin and B. Tsaban, The Discrete Logarirhm Problem in Non-Representable Rings, Preprint 20 II.
3M. Bezem, R. Nieuwenhuis and E.Rodrguez-Carbonel!., Hard problems in max-algebra, control theory, hypergraphs and other areas, Information Processing Letters 110 (4) (2010), 133-138.
4S. Blackburn , S. Galbraith, Cryptanalysis of Two Cryptosystems Based on Group Actions, ASIACRYPT'99, LNCS 1716 (1999), 52-61.
5T. Blyth, Lattices and ordered algebraic structures. Springer-Verlag London Limited 2005.
6P. Butkovic, Max-linear Systems: Theory and Algorithms, Springer Monographs in Mathematics, Springer-Verlag, London Limited 2010.
7J. Certaine , Lattice ordered groupo ids and some related problems, Harvard doctoral thesis, 1943.
81. Climent, P. Navarro and L. Tortosa, On the Arithmetic of the Endomorphisms Ring End(Zp _ Zp2), Applicable Algebra in Engineering, Communication and Computing 22 (2011), pp. 91-108.
9G. Cohen, S. Gaubert and I.-P. Quadrat, Duality and Separation Theorems in Idempotent Semi modules, INRIA, W 4668, December 2002.