-
1
-
-
4544340070
-
Cryptography in an algebraic alphabet
-
Hill LS. Cryptography in an algebraic alphabet. American Mathematical Monthly 1929; 36: 306-312.
-
(1929)
American Mathematical Monthly
, vol.36
, pp. 306-312
-
-
Hill, L.S.1
-
2
-
-
4544337564
-
Concerning certain linear transformation apparatus of cryptography
-
Hill LS. Concerning certain linear transformation apparatus of cryptography. American Mathematical Monthly 1931; 38: 135-154.
-
(1931)
American Mathematical Monthly
, vol.38
, pp. 135-154
-
-
Hill, L.S.1
-
3
-
-
67650620166
-
Computer Security and Cryptography
-
John Wiley & Sons: New Jersey.
-
Konheim AG. Computer Security and Cryptography. John Wiley & Sons: New Jersey, 2007.
-
(2007)
-
-
Konheim, A.G.1
-
4
-
-
0004159566
-
A Course in Number theory and Cryptography
-
Springer-Verlag: New York, -
-
Koblitz N. A Course in Number theory and Cryptography. Springer-Verlag: New York, 1987; 64-74.
-
(1987)
, pp. 64-74
-
-
Koblitz, N.1
-
6
-
-
0003987443
-
Cryptography Theory and Practice
-
3rd edn). Chapman & Hall/CRC: Boca Raton.
-
Stinson DR. Cryptography Theory and Practice (3rd edn). Chapman & Hall/CRC: Boca Raton, 2006.
-
(2006)
-
-
Stinson, D.R.1
-
7
-
-
0026838401
-
-
A new cryptosystem using matrix transformation. 25th IEEE International Carnahan Conference on Security Technology.
-
Yeh YS, Wu TC, Chang CC, Yang WC. A new cryptosystem using matrix transformation. 25th IEEE International Carnahan Conference on Security Technology 1991; 131-138.
-
(1991)
, pp. 131-138
-
-
Yeh, Y.S.1
Wu, T.C.2
Chang, C.C.3
Yang, W.C.4
-
8
-
-
85014948963
-
How to make the Hill cipher secure
-
Saeednia S. How to make the Hill cipher secure. Cryptologia Journal 2000; 24: 353-360.
-
(2000)
Cryptologia Journal
, vol.24
, pp. 353-360
-
-
Saeednia, S.1
-
11
-
-
0003851399
-
Applied cryptography: Protocols, Algorithms, and Source Code in C
-
2nd edn), John Wiley & Sons: New York.
-
Schneier B. Applied cryptography: Protocols, Algorithms, and Source Code in C (2nd edn), John Wiley & Sons: New York, 1996.
-
(1996)
-
-
Schneier, B.1
-
13
-
-
0003902428
-
Cryptography and Network Security Principles and Practices
-
4th edn). Prentice Hall: New Jersey.
-
Stallings W. Cryptography and Network Security Principles and Practices (4th edn). Prentice Hall: New Jersey, 2006.
-
(2006)
-
-
Stallings, W.1
-
14
-
-
2442611804
-
-
An HMAC Processor with Integrated SHA-1 and MD5 Algorithms. IEEE Asia and South Pacific Design Automation Conference (ASP-DAC) January.
-
Wang MY, Su CP, Huang CT, Wu CW. An HMAC Processor with Integrated SHA-1 and MD5 Algorithms. IEEE Asia and South Pacific Design Automation Conference (ASP-DAC) January 2004; 456-458.
-
(2004)
, pp. 456-458
-
-
Wang, M.Y.1
Su, C.P.2
Huang, C.T.3
Wu, C.W.4
-
16
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law L, Menezes A, Qu M, Solinas J, Vanstone S. An efficient protocol for authenticated key agreement. Journal of Designs, Codes and Cryptography 2003; 28: 119-134.
-
(2003)
Journal of Designs, Codes and Cryptography
, vol.28
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
17
-
-
84919085619
-
An improved algorithm for computing logarithms in GF(p) and its cryptographic significance
-
Pohlig SC, Hellman ME. An improved algorithm for computing logarithms in GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 1978; 24: 106-111.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 106-111
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
18
-
-
0003340059
-
The Art of Computer Programming
-
Addison-Wesley: Massachusetts.
-
Knuth DE. The Art of Computer Programming, Vol. 2. Addison-Wesley: Massachusetts, 1981; 1-33.
-
(1981)
, vol.2
, pp. 1-33
-
-
Knuth, D.E.1
-
20
-
-
0003461554
-
Elementary Number Theory and Its Applications
-
2nd edn), Addison-Wesley: Massachusetts.
-
Rosen KH. Elementary Number Theory and Its Applications, (2nd edn), Addison-Wesley: Massachusetts, 1988.
-
(1988)
-
-
Rosen, K.H.1
-
21
-
-
34548827967
-
-
Memory optimized architecture for efficient gauss-jordan matrix inversion. 3rd IEEE Southern Conference on Programmable Logic (SPL'07) February.
-
Matos GM, Neto HC. Memory optimized architecture for efficient gauss-jordan matrix inversion. 3rd IEEE Southern Conference on Programmable Logic (SPL'07) February 2007; 33-38.
-
(2007)
, pp. 33-38
-
-
Matos, G.M.1
Neto, H.C.2
|