. Michael-artin, Advanced Mathematics Series edition, vol.2, 2011.

P. Craig, K. Bauer, and . Millward, Cracking Matrix Encryption Row by Row, Cryptologia, vol.31, issue.1, pp.76-83, 2007.

G. H. Golub and C. F. Van-loan, Matrix computations, vol.3, 2012.

L. Hill, Cryptography in an Algebraic Alphabet, The American Mathematical Monthly, vol.36, issue.6, pp.306-312, 1929.

L. Hill, Concerning Certain Linear Transformation Apparatus of Cryptography, The American Mathematical Monthly, vol.38, pp.135-154, 1931.

, How to Repair the Hill Cipher, Journal of Zhejiang University-Science A, vol.7, issue.12, pp.2022-2030, 2006.

S. Khazaei and S. Ahmadi, , 2017.

, Ciphertext-only Attack on d X d Hill in O(d X 13d)

, Inf. Process. Lett, vol.118, pp.25-29

T. Leap, T. Mcdevitt, K. Novak, and N. Siermine, Further Improvements to the Bauer-Millward Attack On the Hill Cipher, Cryptologia, vol.40, pp.452-468, 2016.

Y. Ahmed, A. G. Mahmoud, and . Chefranov, Hill Cipher Modification Based on Eigenvalues HCM-EE, Proc. of SIN'09, pp.164-167, 2009.

T. Mcdevitt, J. Lehr, and T. Gu, A parallel time-memory tradeoff attack on the hill cipher, Cryptologia, vol.42, issue.5, pp.408-426, 2018.

J. Overbey, W. Traves, and J. Wojdylo, On the Keyspace of the Hill Cipher, Cryptologia, vol.29, issue.1, pp.59-72, 2005.

C. H. Papadimitriou, Computational complexity, 1994.

J. Rotman, The Theory of Groups, 1965.

D. H. Jonathan and . Smith, Introduction to Abstract Algebra, Textbooks in Mathematics, 2008.

D. Stinson, Cryptography: Theory and Practice. CRC/C&H, 2002.

M. Toorani and A. Falahati, A Secure Variant of the Hill Cipher, Proc. of 14th IEEE Symposium on Computers and Communications (ISCC'09), pp.313-316, 2009.

M. Toorani and A. Falahati, A Secure Cryptosystem Based on Affine Transformation, vol.4, pp.207-215, 2011.

S. S. Wagstaff, Cryptanalysis of Number Theoretic Ciphers, 2002.

H. Dae, P. Yum, and . Lee, Cracking Hill Ciphers with Goodness-of-Fit Statistics, Cryptologia, vol.33, issue.4, pp.335-342, 2009.