暂无分享,去创建一个
[1] Komal Agrawal,et al. Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem , 2014 .
[2] Rudolf Lide,et al. Finite fields , 1983 .
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] AbdAllah A. ElHabshy. Augmented Hill Cipher , 2019, Int. J. Netw. Secur..
[5] Alexander G. Chefranov,et al. Hill cipher modification based on eigenvalues HCM-EE , 2009, SIN '09.
[6] Ganapati Panda,et al. Image Encryption Using Advanced Hill Cipher Algorithm , 2009 .
[7] Chin-Chen Chang,et al. A new cryptosystem using matrix transformation , 1991, Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology.
[8] Addepalli V. N. Krishna,et al. A Modified Hill Cipher Based on Circulant Matrices , 2012 .
[9] Mohammed Amin,et al. How to repair the Hill cipher , 2006 .
[10] Shahrokh Saeednia. HOW TO MAKE THE HILL CIPHER SECURE , 2000, Cryptologia.
[11] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[12] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[13] K. Conrad,et al. Finite Fields , 2018, Series and Products in the Development of Mathematics.