Login / Signup
Applications of the Drazin Inverse to the Hill Cryptographic System. Part III.
Robert E. Hartwig
Jack Levine
Published in:
Cryptologia (1981)
Keyphrases
</>
smart card
table of contents
hash functions
security protocols
information systems
database management
random number generator
databases
social networks
case study
security properties
encryption key