Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm
暂无分享,去创建一个
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[3] G. R. Blakley. Twenty years of cryptography in the open literature , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[4] Junji Shikata,et al. Cryptography with information theoretic security , 2002, Proceedings of the IEEE Information Theory Workshop.
[5] William Stallings,et al. Cryptography and Network Security (4th Edition) , 2005 .