Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem
暂无分享,去创建一个
Bibhudendra Acharya | Sourabh Tiwari | Mukul Dhar Sharma | Vinay Kumar Minz | B. Acharya | Sourabh Tiwari | M. Sharma
[1] Saroj Kumar Panigrahy,et al. H-S-X Cryptosystem and Its Application to Image Encryption , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[2] M.I. Aziz,et al. Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.
[3] V. U.K. Sastry,et al. Modified Hill Cipher for a Large Block of Plaintext with Interlacing and Iteration , 2008 .
[4] Charlie Obimbo,et al. A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption , 2007, The Journal of Supercomputing.
[5] William Stallings,et al. Cryptography and network security , 1998 .
[6] Ganapati Panda,et al. Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System , 2009, 2009 International Conference on Advanced Computer Control.
[7] Saroj Kumar Panigrahy,et al. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm , 2007 .
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Alper Kanak. BIOMETRICS FOR COMPUTER SECURITY AND CRYPTOGRAPHY , 2004 .
[10] Mousa Farajallah,et al. Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher , 2009 .
[11] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[12] G. R. Blakley. Twenty years of cryptography in the open literature , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).