Volume 2 | Issue 1 | Year 2011 | Article Id. IJMTT-V2I1P506 | DOI : https://doi.org/10.14445/22315373/IJMTT-V2I1P506
Penmetsa V Krishna Raja , A S N Chakravarthy , Prof. P S Avadhani, "A CRYPTOSYSTEM BASED ON HILBERT MATRIX USING CIPHER BLOCK CHAINING MODE," International Journal of Mathematics Trends and Technology (IJMTT), vol. 2, no. 1, pp. 17-22, 2011. Crossref, https://doi.org/10.14445/22315373/IJMTT-V2I1P506
[1] JE Andersen and C Berg,“Quantum Hilbert matrices and orthogonal polynomials”, Journal of computational and applied mathematics, 2009.
[2] I Gohberg and V Olshevsky, Numerische Mathematik, ”Fast inversion of Chebyshev-Vandermonde matrices”, Springer Publications,New York, 1994.
[3] V Mani and RE Hartwig, “Some properties of the q-adic vandermonde matrix”, Electron. J. Linear Algebra, emis.ams.org, 1996.
[4] R Alvarez, FM Martinez and JF Vicent A, “A New Public Key Cryptosystem based on Matrices”, WSEAS Information Security and Privacy (2007) 36-39 2007.
[5] Y Matsuo, “Matrix Theory, Hilbert Scheme and Integrable System” Arxiv preprint hep-th /9807085, 1998.
[6] Beckermann, Bernhard, "The condition number of real Vandermonde, Krylov and positive definite Hankel matrices". Numerische Mathematik 85 (4): 553–577, 2000.
[7] C Li, D Zhang, G Chen,” Cryptanalysis of an image encryption scheme based on the Hill cipher”, Journal of Zhejiang University-Science A, Springer Publications, New york, 2008.
[8] S. Suresh Babu, “A symmetric cryptographic model for authentication and confidentiality using Hilbert matrix”, Ph.D thesis, Andhra University, Visakhapatnam, 2010.
[9] E Diamantopoulos and AG Siskakis, “Composition Operators and the Hilbert Matrix”, Studia Math, 2000.
[10] Garrettt, P. "Making , Breaking Codes : An Introduction to
Cryptology" , Upper Saddle River,NJ:Prentice Hall ,2001.
[11] A., Herzberg A., “Protecting (even naïve) web users from spoofing
and phishing attacks”, Bar-Ilan (Israel), 2004.
[12] A. F. Al Shahri, D. G. Smith and J. M. Irvine, “Implementation of
Secret Sharing to Increase Network Security and Reliability.”, ESPRC
Postgraduate Research in Electronics and Photonics (PREP),
Nottingham University, UK. April 2002.
[13] A. F. Al Shahri, D. G. Smith and J. M. Irvine, “Mobile distributed
authentication protocol”, ISWSN’03 Dhahran, Saudi Arabia, March
24-26, 2003.
[14] A. Juels and S.A. Weis, “Authenticating Pervasive Devices with
Human Protocols,” Proc. 25th Ann. Int’l Cryptology Conf.
(CRYPTO ’05), pp. 293-308, 2005.
[15] A.K.Awasthi and S.Lal, “A remote user authentication scheme using
smart cards with forward secrecy”, IEEE Trans. Consumer Electronics,
Vol. 49, pp.1246-1248, 2003.
[16] A Klein, “Attacks on the RC4 stream cipher”, Designs, Codes and
Cryptography, Springer Publications, New York, 2008.
[17] A. Menezes, P. Oorschot, S. Vanstone, “Handbook of Applied
Cryptogtaphy”, CRC Press LLC 1997.
[18] A. Paul and U. Ramachandran. “Computation communication tradeoff for power and bandwidth savings in remote authentication over
wireless networks”, Technical Report GIT-CERCS-04-01, Georgia
Institute of Technology, 2004.