Login / Signup
Applications of the Drazin Inverse to the Hill Cryptographic System. Part II.
Jack Levine
Robert E. Hartwig
Published in:
Cryptologia (1980)
Keyphrases
</>
smart card
hash functions
real time
encryption key
orthogonal matrices
data sets
databases
neural network
artificial intelligence
computer vision
feature selection
case study
cryptographic protocols
secure communication
differential power analysis