메뉴 건너뛰기




Volumn 27, Issue 5, 2004, Pages 743-746

Comments on Saeednia's improved scheme for the hill cipher

Author keywords

Cryptosystem; Hill cipher; Known plaintext attack; One way hash function

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTATIONAL COMPLEXITY; COMPUTATIONAL METHODS; FUNCTIONS; MATHEMATICAL TRANSFORMATIONS; MATRIX ALGEBRA;

EID: 4544323204     PISSN: 02533839     EISSN: 21587299     Source Type: Journal    
DOI: 10.1080/02533839.2004.9670922     Document Type: Article
Times cited : (30)

References (7)
  • 2
    • 84977806870 scopus 로고
    • Linear Structures in Blockciphers
    • The Netherlands: Springer-Verlag, Lecture Notes in Computer Science (LNCS)
    • Evertse, J. H., 1987. “Linear Structures in Blockciphers,”. In Advances in Cryptology - EUROCRYPT ‘87, Vol. 304, 249–266. The Netherlands:Springer-Verlag. Lecture Notes in Computer Science (LNCS)
    • (1987) Advances in Cryptology - EUROCRYPT ‘87 , vol.304 , pp. 249-266
    • Evertse, J.H.1
  • 3
    • 0003629990 scopus 로고    scopus 로고
    • NIST, U. S. Department of Commerce
    • Federal Information Processing Standard (FIPS) 180–2. 2002. “Secure Hash Standard,”. NIST, U. S. Department of Commerce.
    • (2002) Secure Hash Standard
  • 4
    • 4544340070 scopus 로고
    • Cryptography in an Algebraic Alphabet
    • Hill, L. S., 1929. “Cryptography in an Algebraic Alphabet”. American Mathematical Monthly, 36 (6):306–312.
    • (1929) American Mathematical Monthly , vol.36 , Issue.6 , pp. 306-312
    • Hill, L.S.1
  • 5
    • 4544337564 scopus 로고
    • Concerning Certain Linear Transformation Apparatus of Cryptography
    • Hill, L. S., 1931. “Concerning Certain Linear Transformation Apparatus of Cryptography”. American Mathematical Monthly, 38 (3):135–154.
    • (1931) American Mathematical Monthly , vol.38 , Issue.3 , pp. 135-154
    • Hill, L.S.1
  • 6
    • 85014948963 scopus 로고    scopus 로고
    • How to Make the Hill Cipher Secure
    • Saeednia, S., 2000. “How to Make the Hill Cipher Secure”. Cryptologia, 24 (4):353–360.
    • (2000) Cryptologia , vol.24 , Issue.4 , pp. 353-360
    • Saeednia, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.