Login / Signup
Applications of the Drazin Inverse to the Hill Cryptographic System. Part IV.
Robert E. Hartwig
Jack Levine
Published in:
Cryptologia (1981)
Keyphrases
</>
smart card
table of contents
security protocols
data sets
security properties
artificial intelligence
computer vision
key management
encryption scheme
random number generator
real time
hash functions
evolutionary algorithm
case study
decision trees
knowledge base
genetic algorithm
real world
neural network