Volume 54 | Number 7 | Year 2018 | Article Id. IJMTT-V54P562 | DOI : https://doi.org/10.14445/22315373/IJMTT-V54P562
N.Vijayaraghavan, S.Narasimhan, M.Baskar, "A Study on the Analysis of Hill’s Cipher in Cryptography," International Journal of Mathematics Trends and Technology (IJMTT), vol. 54, no. 7, pp. 519-522, 2018. Crossref, https://doi.org/10.14445/22315373/IJMTT-V54P562
[1] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm, International Journal of Security, Vol 1, Issue 1, 2007, pp. 14-21.
[2] Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento A.C. 2002. Cyptography with Information Theoretic Security. Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct 2002.
[3]Menezes, A. J., P.C. Van Oorschot, S.A. Van Stone. 1996. Handbook of Applied Cryptography. CRC press.
[4] Overbey, J., Traves, W., Wojdylo, J., 2005. On the keyspace of the Hill cipher. Cryptologia, 9(l):59-72.
[5] Petersen, K., 2000. Notes on Number Theory and Cryptography.