共 25 条
[11]
Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems
[J].
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT),
2012,
:116-121
[12]
Hamissa G., 2011, Proceedings of the 2011 International Conference on Computer Engineering & Systems (ICCES 2011), P260, DOI 10.1109/ICCES.2011.6141053
[13]
Hill LS., 1929, AM MATH MONTHLY, V36, P306
[14]
How to repair the Hill cipher
[J].
Journal of Zhejiang University-SCIENCE A,
2006, 7 (12)
:2022-2030
[15]
Kolbitz N., 1987, MATH COMPUT, V48, P203, DOI DOI 10.1090/S0025-5718-1987-0866109-5
[16]
Hill Cipher Modification based on Pseudo-Random Eigenvalues
[J].
APPLIED MATHEMATICS & INFORMATION SCIENCES,
2014, 8 (02)
:505-516
[17]
USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY
[J].
LECTURE NOTES IN COMPUTER SCIENCE,
1986, 218
:417-426
[18]
Naskar Prabir Kr, 2014, International Journal of Image, Graphics and Signal Processing, V6, P30, DOI 10.5815/ijigsp.2014.02.04
[19]
Nayak B., 2014, THESIS
[20]
Panduranga HT, 2012, 2012 INTERNATIONAL CONFERENCE ON MACHINE VISION AND IMAGE PROCESSING (MVIP), P101, DOI 10.1109/MVIP.2012.6428770