[1. Hill, L. S. Cryptography in an Algebraic Alphabet. - American Mathematical Monthly, Vol. 36, 1929, No 6, 306-312.10.1080/00029890.1929.11986963]Search in Google Scholar
[2. Hill, L. S. Concerning Certain Linear Transformation Apparatus of Cryptography. - American Mathematical Monthly, Vol. 38, 1931, No 3, 135-154.10.1080/00029890.1931.11987161]Search in Google Scholar
[3. Stallings, W. Cryptography and Network Security Principles and Practices. 3rd Edition. New Jersey, Prentice Hall, 1999.]Search in Google Scholar
[4. Sastry, V. U. K., N. Ravi Shankar. Modified Hill Cipher with Interlacing and Iteration. - Journal of Computer Science, Science Publications, Vol. 3, 2007, No 11, 854-859.10.3844/jcssp.2007.854.859]Search in Google Scholar
[5. Sastry, V. U. K., N. Ravi Shankar. Modified Hill Cipher fora Large Block of Plaintext with Interlacing and Iteration. - Journal of Computer Science, Science Publications, Vol. 4, 2008, No 1, 15-20.10.3844/jcssp.2008.15.20]Search in Google Scholar
[6. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Hill Cipher Involving Interweaving and Iteration. - International Journal of Network Security, Vol. 11, 2010, No 1, 11-16.]Search in Google Scholar
[7. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Large Block Cipher Involving Interweaving and Iteration. - In: Proceedings of the International Conference on Advances and Emerging Trends in Computing Technologies (ICAET’10), 21-24 June 2010, Chennai, 328-333.]Search in Google Scholar
[8. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Playfair Cipher Involving Interweaving and Iteration. - International Journal of Computer Theory and Engineering, Vol. 1, December 2009, No 5, 594-598.10.7763/IJCTE.2009.V1.96]Search in Google Scholar
[9. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Playfair Cipher for a Large Block of Plaintext. - International Journal of Computer Theory and Engineering, Vol. 1, 2009, No 5, 590-594.10.7763/IJCTE.2009.V1.95]Search in Google Scholar
[10. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavan i. A Generalized Playfair Cipher Involving Intertwining, Interweaving and Iteration. - International Journal of Networks and Mobile Technology, Vol. 1, 2010, No 2, 45-53.]Search in Google Scholar
[11. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Blending of A Generalized Playfair Cipher and A Modified Hill Cipher. - International Journal of Networks and Mobile Technologies, Vol. 2, 2011, No 1, 35-43.]Search in Google Scholar
[12. Sastry, V. U. K., V. Janaki. On the Modular Arithmetic Inverse in the Cryptology of Hill Cipher. - In: Proceedings of North American Technology and Business Conference, September 2005, Montreal, Canada.]Search in Google Scholar
[13. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part I. - Cryptologia, Vol. 4, 1980, No 2, 71-85.10.1080/0161-118091854906]Search in Google Scholar
[14. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part II. - Cryptologia, Vol. 4, 1980, No 3, 150-168.10.1080/0161-118091855059]Search in Google Scholar
[15. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part III. - Cryptologia, Vol. 5, 1981, No 2, 67-77.10.1080/0161-118191855850]Search in Google Scholar
[16. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part IV. - Cryptologia, Vol. 5, 1981, No 4, 213-228.10.1080/0161-118191856057]Search in Google Scholar
[17. Makar, B. H. Application ofa Certain Class of Infinite Matrices to the Hill Cryptographic System. - Cryptologia, Vol. 7, 1983, No 1, 63-78.10.1080/0161-118391857793]Search in Google Scholar
[18. Levine, J., R. Chandler. The Hill Cryptographic System with Unknown Cipher Alphabet, But Known Plaintext. - Cryptologia, Vol. 13, 1989, No 1, 1-28.10.1080/0161-118991863736]Search in Google Scholar
[19. Kiele, W. A. A Tensor-Theoretic Enhancement to the Hill Cipher System. - Cryptologia, Vol. 14, 1990, No 3, 225-233.10.1080/0161-119091864931]Search in Google Scholar
[20. Thilaka, B., K. Rajalakshmi. An Extension of Hill Cipher Using Generalized Inverses and mth Residue modulo n. - Cryptologia, Vol. 29, 2005, No 4, 267-276.10.1080/0161-110591893933]Search in Google Scholar
[21. Saeednia, S. How to Make the Hill Cipher Secure. - Cryptologia, Vol. 24, 2000, No 4, 353-360.10.1080/01611190008984253]Search in Google Scholar
[22. Yeh, Y. S., T. C. Wu, C. C. Chang, W. C. Yang. A New Cryptosystem Using Matrix Transformation. - In: Proceedings of the 25th IEEE International Carnahan Conference on Security Technology, 1991, 131-138.]Search in Google Scholar
[23. Mahmoud, A. Y., A. G. Chefranov. Hill Cipher Modification Based on Eigenvalues HCMEE. - In: Proceedings of the Second International Conference on Security of Information and Networks (SIN2009), Gazimagusa (TRNC) North Cyprus, A. Elci, M. Orgun, A. Chefranov, (Eds) ACM, New York, USA, 2009, 164-167.10.1145/1626195.1626237]Search in Google Scholar
[24. Mahmoud, A. Y., A. G. Chefranov. Hill Cipher Modification Based on Pseudo-Random Eigenvalues. - Fourth coming paper, to appear in Applied Mathematics & Information Sciences.]Search in Google Scholar
[25. Lin, C. H., C. Y. Lee, C. Y. Lee. Comments on Saeednia's Improved Scheme for the Hill Cipher. - Journal of the Chinese Institute of Engineers, Vol. 27, 2004, No 5, 743-746.10.1080/02533839.2004.9670922]Search in Google Scholar
[26. Toorani, M., A. Falahati. A Secure Cryptosystem Based on Affine Transformation. - Journal of Security and Communication Networks, Vol. 4, 2011, No 2, 207-215.10.1002/sec.137]Search in Google Scholar
[27. Toorani, M., A. Falahati. A Secure Variant of the Hill Cipher. - In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC’09), July 2009, 313-316.10.1109/ISCC.2009.5202241]Search in Google Scholar
[28. Overbey, J., W. Traves, J. Wojdylo. On the Keyspace of the Hill Cipher. - Cryptologia, Vol. 29, 2005, No 1, 59-72.10.1080/0161-110591893771]Search in Google Scholar
[29. Bauer, C., K. Millward. Cracking Matrix Encryption Row by Row. - Cryptologia, Vol. 31, 2007, 76-83. 10.1080/01611190600947806]Search in Google Scholar