Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher
暂无分享,去创建一个
[1] Mohammed Amin,et al. How to repair the Hill cipher , 2006 .
[2] Omar S. Elkeelany,et al. Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware , 2008, J. Comput..
[3] V.U.K.Sastry,et al. An Iterative Process Involving Interlacing and Decoposition in the Devlopment of a Block Cipher , 2006 .
[4] Saroj Kumar Panigrahy,et al. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm , 2007 .
[5] Ganapati Panda,et al. Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System , 2009, 2009 International Conference on Advanced Computer Control.
[6] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[7] Gurpreet Dhillon,et al. Principles of information systems security - text and cases , 2006 .
[8] Chu-Hsing Lin,et al. Comments on Saeednia's improved scheme for the hill cipher , 2004 .
[9] Christof Paar,et al. An instruction-level distributed processor for symmetric-key cryptography , 2005, IEEE Transactions on Parallel and Distributed Systems.
[10] Chu,et al. Comments on Saeednia ' s improved scheme for the hill cipher , 2004 .
[11] Chin-Chen Chang,et al. A new cryptosystem using matrix transformation , 1991, Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology.
[12] Gustavus J. Simmons,et al. Symmetric and Asymmetric Encryption , 1979, CSUR.
[13] Dennis Guster,et al. Secret key distribution protocol using public key cryptography , 2003 .