메뉴 건너뛰기




Volumn 4, Issue 2, 2011, Pages 207-215

A secure cryptosystem based on affine transformation

Author keywords

Affine Hill Cipher; Cryptographic protocols; Keyspace; Matrix Transformation; Symmetric Cryptosystem

Indexed keywords

LINEAR TRANSFORMATIONS;

EID: 79251570883     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.137     Document Type: Article
Times cited : (14)

References (21)
  • 1
    • 4544340070 scopus 로고
    • Cryptography in an algebraic alphabet
    • Hill LS. Cryptography in an algebraic alphabet. American Mathematical Monthly 1929; 36: 306-312.
    • (1929) American Mathematical Monthly , vol.36 , pp. 306-312
    • Hill, L.S.1
  • 2
    • 4544337564 scopus 로고
    • Concerning certain linear transformation apparatus of cryptography
    • Hill LS. Concerning certain linear transformation apparatus of cryptography. American Mathematical Monthly 1931; 38: 135-154.
    • (1931) American Mathematical Monthly , vol.38 , pp. 135-154
    • Hill, L.S.1
  • 3
    • 67650620166 scopus 로고    scopus 로고
    • Computer Security and Cryptography
    • John Wiley & Sons: New Jersey.
    • Konheim AG. Computer Security and Cryptography. John Wiley & Sons: New Jersey, 2007.
    • (2007)
    • Konheim, A.G.1
  • 4
    • 0004159566 scopus 로고
    • A Course in Number theory and Cryptography
    • Springer-Verlag: New York, -
    • Koblitz N. A Course in Number theory and Cryptography. Springer-Verlag: New York, 1987; 64-74.
    • (1987) , pp. 64-74
    • Koblitz, N.1
  • 6
    • 0003987443 scopus 로고    scopus 로고
    • Cryptography Theory and Practice
    • 3rd edn). Chapman & Hall/CRC: Boca Raton.
    • Stinson DR. Cryptography Theory and Practice (3rd edn). Chapman & Hall/CRC: Boca Raton, 2006.
    • (2006)
    • Stinson, D.R.1
  • 7
    • 0026838401 scopus 로고
    • A new cryptosystem using matrix transformation. 25th IEEE International Carnahan Conference on Security Technology.
    • Yeh YS, Wu TC, Chang CC, Yang WC. A new cryptosystem using matrix transformation. 25th IEEE International Carnahan Conference on Security Technology 1991; 131-138.
    • (1991) , pp. 131-138
    • Yeh, Y.S.1    Wu, T.C.2    Chang, C.C.3    Yang, W.C.4
  • 8
    • 85014948963 scopus 로고    scopus 로고
    • How to make the Hill cipher secure
    • Saeednia S. How to make the Hill cipher secure. Cryptologia Journal 2000; 24: 353-360.
    • (2000) Cryptologia Journal , vol.24 , pp. 353-360
    • Saeednia, S.1
  • 10
    • 49149095891 scopus 로고    scopus 로고
    • Cryptanalysis of an image encryption scheme based on the Hill cipher
    • Li C, Zhang D, Chen G. Cryptanalysis of an image encryption scheme based on the Hill cipher. Journal of Zhejiang University - Science A 2008; 9: 1118-1123.
    • (2008) Journal of Zhejiang University - Science A , vol.9 , pp. 1118-1123
    • Li, C.1    Zhang, D.2    Chen, G.3
  • 11
    • 0003851399 scopus 로고    scopus 로고
    • Applied cryptography: Protocols, Algorithms, and Source Code in C
    • 2nd edn), John Wiley & Sons: New York.
    • Schneier B. Applied cryptography: Protocols, Algorithms, and Source Code in C (2nd edn), John Wiley & Sons: New York, 1996.
    • (1996)
    • Schneier, B.1
  • 13
    • 0003902428 scopus 로고    scopus 로고
    • Cryptography and Network Security Principles and Practices
    • 4th edn). Prentice Hall: New Jersey.
    • Stallings W. Cryptography and Network Security Principles and Practices (4th edn). Prentice Hall: New Jersey, 2006.
    • (2006)
    • Stallings, W.1
  • 14
    • 2442611804 scopus 로고    scopus 로고
    • An HMAC Processor with Integrated SHA-1 and MD5 Algorithms. IEEE Asia and South Pacific Design Automation Conference (ASP-DAC) January.
    • Wang MY, Su CP, Huang CT, Wu CW. An HMAC Processor with Integrated SHA-1 and MD5 Algorithms. IEEE Asia and South Pacific Design Automation Conference (ASP-DAC) January 2004; 456-458.
    • (2004) , pp. 456-458
    • Wang, M.Y.1    Su, C.P.2    Huang, C.T.3    Wu, C.W.4
  • 17
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms in GF(p) and its cryptographic significance
    • Pohlig SC, Hellman ME. An improved algorithm for computing logarithms in GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 1978; 24: 106-111.
    • (1978) IEEE Transactions on Information Theory , vol.24 , pp. 106-111
    • Pohlig, S.C.1    Hellman, M.E.2
  • 18
    • 0003340059 scopus 로고
    • The Art of Computer Programming
    • Addison-Wesley: Massachusetts.
    • Knuth DE. The Art of Computer Programming, Vol. 2. Addison-Wesley: Massachusetts, 1981; 1-33.
    • (1981) , vol.2 , pp. 1-33
    • Knuth, D.E.1
  • 20
    • 0003461554 scopus 로고
    • Elementary Number Theory and Its Applications
    • 2nd edn), Addison-Wesley: Massachusetts.
    • Rosen KH. Elementary Number Theory and Its Applications, (2nd edn), Addison-Wesley: Massachusetts, 1988.
    • (1988)
    • Rosen, K.H.1
  • 21
    • 34548827967 scopus 로고    scopus 로고
    • Memory optimized architecture for efficient gauss-jordan matrix inversion. 3rd IEEE Southern Conference on Programmable Logic (SPL'07) February.
    • Matos GM, Neto HC. Memory optimized architecture for efficient gauss-jordan matrix inversion. 3rd IEEE Southern Conference on Programmable Logic (SPL'07) February 2007; 33-38.
    • (2007) , pp. 33-38
    • Matos, G.M.1    Neto, H.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.