-
1
-
-
4544340070
-
Cryptography in an Algebraic Alphabet
-
L.S. Hill, "Cryptography in an Algebraic Alphabet", American Mathematical Monthly, Vol.36, No.6, pp.306-312, 1929.
-
(1929)
American Mathematical Monthly
, vol.36
, Issue.6
, pp. 306-312
-
-
Hill, L.S.1
-
3
-
-
33845874404
-
How to repair the Hill cipher
-
Dec
-
I.A. Ismail, M. Amin, and H. Diab, "How to repair the Hill cipher", Journal of Zhejiang University-Science A, Vol.7, No.12, pp.2022-2030, Dec. 2006.
-
(2006)
Journal of Zhejiang University-Science A
, vol.7
, Issue.12
, pp. 2022-2030
-
-
Ismail, I.A.1
Amin, M.2
Diab, H.3
-
4
-
-
0026838401
-
A New Cryptosystem Using Matrix Transformation
-
Oct
-
Y.S. Yeh, T.C. Wu, C.C. Chang, and W.C. Yang, "A New Cryptosystem Using Matrix Transformation", Proceedings of the 25th IEEE International Carnahan Conference on Security Technology, pp.131-138, Oct. 1991.
-
(1991)
Proceedings of the 25th IEEE International Carnahan Conference on Security Technology
, pp. 131-138
-
-
Yeh, Y.S.1
Wu, T.C.2
Chang, C.C.3
Yang, W.C.4
-
5
-
-
85014948963
-
How to Make the Hill Cipher Secure
-
Oct
-
S. Saeednia, "How to Make the Hill Cipher Secure", Cryptologia Journal, Vol.24, No.4, pp.353-360, Oct. 2000.
-
(2000)
Cryptologia Journal
, vol.24
, Issue.4
, pp. 353-360
-
-
Saeednia, S.1
-
6
-
-
4544323204
-
Comments on Saeednia's improved scheme for the Hill cipher
-
C.H. Lin, C.Y. Lee, and C.Y. Lee, "Comments on Saeednia's improved scheme for the Hill cipher", Journal of the Chinese institute of engineers, Vol.27, No.5, pp.743-746, 2004.
-
(2004)
Journal of the Chinese institute of engineers
, vol.27
, Issue.5
, pp. 743-746
-
-
Lin, C.H.1
Lee, C.Y.2
Lee, C.Y.3
-
7
-
-
49149095891
-
Cryptanalysis of an image encryption scheme based on the Hill cipher
-
C. Li, D. Zhang, and G. Chen, "Cryptanalysis of an image encryption scheme based on the Hill cipher", Journal of Zhejiang University - Science A, Vol.9, No.8, pp.1118-1123, 2008.
-
(2008)
Journal of Zhejiang University - Science A
, vol.9
, Issue.8
, pp. 1118-1123
-
-
Li, C.1
Zhang, D.2
Chen, G.3
-
8
-
-
85015582598
-
On the Keyspace of the Hill Cipher
-
J. Overbey, W. Traves, and J. Wojdylo, "On the Keyspace of the Hill Cipher", Cryptologia Journal, Vol.29, No.1, pp.59-72, 2005.
-
(2005)
Cryptologia Journal
, vol.29
, Issue.1
, pp. 59-72
-
-
Overbey, J.1
Traves, W.2
Wojdylo, J.3
-
9
-
-
74549221711
-
An efficient Protocol for Authenticated Key Agreement
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, "An efficient Protocol for Authenticated Key Agreement", Journal of Designs, Codes and Cryptography, Vol.28, pp.119-134, 2003.
-
(2003)
Journal of Designs, Codes and Cryptography
, vol.28
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
10
-
-
0036282473
-
Performance Analysis of IPSec Protocol: Encryption and Authentication
-
O. Elkeelany, M.M. Matalgah, K.P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi, and J. Qaddour, "Performance Analysis of IPSec Protocol: Encryption and Authentication", IEEE International Conference on Communications, Vol.2, pp.1164-1168, 2002.
-
(2002)
IEEE International Conference on Communications
, vol.2
, pp. 1164-1168
-
-
Elkeelany, O.1
Matalgah, M.M.2
Sheikh, K.P.3
Thaker, M.4
Chaudhry, G.5
Medhi, D.6
Qaddour, J.7
|