Login / Signup

Applications of the Drazin Inverse to the Hill Cryptographic System. Part III.

Robert E. HartwigJack Levine
Published in: Cryptologia (1981)
Keyphrases
  • smart card
  • table of contents
  • hash functions
  • security protocols
  • information systems
  • database management
  • random number generator
  • databases
  • social networks
  • case study
  • security properties
  • encryption key