Login / Signup
Applications of the Drazin Inverse to the Hill Cryptographic System. Part I.
Jack Levine
Robert E. Hartwig
Published in:
Cryptologia (1980)
Keyphrases
</>
smart card
data sets
security protocols
table of contents
encryption key
packet filtering
real time
optimal solution
digital libraries
lecture notes
network security
hash functions
s box
security properties