暂无分享,去创建一个
[1] Gary L. Mullen,et al. Finite Fields and Applications , 2007, Student mathematical library.
[2] Ole Immanuel Franksen. Mr. Babbage's Secret: The Tale of a Cypher and Apl , 1985 .
[3] Q-A Kester,et al. A novel cryptographic key technique , 2012, 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST).
[4] Dhinaharan Nagamalai,et al. Advanced Computing , 2011 .
[5] Quist-Aphetsi Kester,et al. A cryptosystem based on Vigenère cipher with varying key , 2012 .
[6] Quist-Aphetsi Kester. A public-key exchange cryptographic technique using matrix , 2012, 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST).
[7] G. Prichett,et al. Cryptology: From Caesar Ciphers to Public-key Cryptosystems. , 1987 .
[8] K. M. Koumadi,et al. Cryptographie technique for image encryption based on the RGB pixel displacement , 2012, 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST).
[9] Helmut Knebl,et al. Symmetric-Key Encryption , 2007 .
[10] Khalid Imam Rahmani,et al. ALPHA-QWERTY CIPHER: AN EXTENDED VIGENÈRE CIPHER , 2012 .
[11] Aiden A. Bruen,et al. Cryptography, information theory, and error-correction - a handbook for the 21st century , 2005, Wiley-Interscience series in discrete mathematics and optimization.
[12] Helmut Knebl,et al. Introduction to Cryptography: Principles and Applications (Information Security and Cryptography) , 2007 .
[13] Abraham Sinkov,et al. Elementary Cryptanalysis: A Mathematical Approach , 1970 .
[14] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.