Login / Signup

Applications of the Drazin Inverse to the Hill Cryptographic System. Part I.

Jack LevineRobert E. Hartwig
Published in: Cryptologia (1980)
Keyphrases
  • smart card
  • data sets
  • security protocols
  • table of contents
  • encryption key
  • packet filtering
  • real time
  • optimal solution
  • digital libraries
  • lecture notes
  • network security
  • hash functions
  • s box
  • security properties