, Advanced Mathematics Series edition, vol.2, 2011.
Cracking Matrix Encryption Row by Row, Cryptologia, vol.31, issue.1, pp.76-83, 2007. ,
, Matrix computations, vol.3, 2012.
Cryptography in an Algebraic Alphabet, The American Mathematical Monthly, vol.36, issue.6, pp.306-312, 1929. ,
Concerning Certain Linear Transformation Apparatus of Cryptography, The American Mathematical Monthly, vol.38, pp.135-154, 1931. ,
, How to Repair the Hill Cipher, Journal of Zhejiang University-Science A, vol.7, issue.12, pp.2022-2030, 2006.
, , 2017.
, Ciphertext-only Attack on d X d Hill in O(d X 13d)
, Inf. Process. Lett, vol.118, pp.25-29
Further Improvements to the Bauer-Millward Attack On the Hill Cipher, Cryptologia, vol.40, pp.452-468, 2016. ,
Hill Cipher Modification Based on Eigenvalues HCM-EE, Proc. of SIN'09, pp.164-167, 2009. ,
A parallel time-memory tradeoff attack on the hill cipher, Cryptologia, vol.42, issue.5, pp.408-426, 2018. ,
On the Keyspace of the Hill Cipher, Cryptologia, vol.29, issue.1, pp.59-72, 2005. ,
Computational complexity, 1994. ,
The Theory of Groups, 1965. ,
Introduction to Abstract Algebra, Textbooks in Mathematics, 2008. ,
, Cryptography: Theory and Practice. CRC/C&H, 2002.
A Secure Variant of the Hill Cipher, Proc. of 14th IEEE Symposium on Computers and Communications (ISCC'09), pp.313-316, 2009. ,
A Secure Cryptosystem Based on Affine Transformation, vol.4, pp.207-215, 2011. ,
Cryptanalysis of Number Theoretic Ciphers, 2002. ,
Cracking Hill Ciphers with Goodness-of-Fit Statistics, Cryptologia, vol.33, issue.4, pp.335-342, 2009. ,