Accesso libero

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

INFORMAZIONI SU QUESTO ARTICOLO

Cita

1. Hill, L. S. Cryptography in an Algebraic Alphabet. - American Mathematical Monthly, Vol. 36, 1929, No 6, 306-312.10.1080/00029890.1929.11986963Search in Google Scholar

2. Hill, L. S. Concerning Certain Linear Transformation Apparatus of Cryptography. - American Mathematical Monthly, Vol. 38, 1931, No 3, 135-154.10.1080/00029890.1931.11987161Search in Google Scholar

3. Stallings, W. Cryptography and Network Security Principles and Practices. 3rd Edition. New Jersey, Prentice Hall, 1999.Search in Google Scholar

4. Sastry, V. U. K., N. Ravi Shankar. Modified Hill Cipher with Interlacing and Iteration. - Journal of Computer Science, Science Publications, Vol. 3, 2007, No 11, 854-859.10.3844/jcssp.2007.854.859Search in Google Scholar

5. Sastry, V. U. K., N. Ravi Shankar. Modified Hill Cipher fora Large Block of Plaintext with Interlacing and Iteration. - Journal of Computer Science, Science Publications, Vol. 4, 2008, No 1, 15-20.10.3844/jcssp.2008.15.20Search in Google Scholar

6. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Hill Cipher Involving Interweaving and Iteration. - International Journal of Network Security, Vol. 11, 2010, No 1, 11-16.Search in Google Scholar

7. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Large Block Cipher Involving Interweaving and Iteration. - In: Proceedings of the International Conference on Advances and Emerging Trends in Computing Technologies (ICAET’10), 21-24 June 2010, Chennai, 328-333.Search in Google Scholar

8. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Playfair Cipher Involving Interweaving and Iteration. - International Journal of Computer Theory and Engineering, Vol. 1, December 2009, No 5, 594-598.10.7763/IJCTE.2009.V1.96Search in Google Scholar

9. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Playfair Cipher for a Large Block of Plaintext. - International Journal of Computer Theory and Engineering, Vol. 1, 2009, No 5, 590-594.10.7763/IJCTE.2009.V1.95Search in Google Scholar

10. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavan i. A Generalized Playfair Cipher Involving Intertwining, Interweaving and Iteration. - International Journal of Networks and Mobile Technology, Vol. 1, 2010, No 2, 45-53.Search in Google Scholar

11. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Blending of A Generalized Playfair Cipher and A Modified Hill Cipher. - International Journal of Networks and Mobile Technologies, Vol. 2, 2011, No 1, 35-43.Search in Google Scholar

12. Sastry, V. U. K., V. Janaki. On the Modular Arithmetic Inverse in the Cryptology of Hill Cipher. - In: Proceedings of North American Technology and Business Conference, September 2005, Montreal, Canada.Search in Google Scholar

13. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part I. - Cryptologia, Vol. 4, 1980, No 2, 71-85.10.1080/0161-118091854906Search in Google Scholar

14. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part II. - Cryptologia, Vol. 4, 1980, No 3, 150-168.10.1080/0161-118091855059Search in Google Scholar

15. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part III. - Cryptologia, Vol. 5, 1981, No 2, 67-77.10.1080/0161-118191855850Search in Google Scholar

16. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part IV. - Cryptologia, Vol. 5, 1981, No 4, 213-228.10.1080/0161-118191856057Search in Google Scholar

17. Makar, B. H. Application ofa Certain Class of Infinite Matrices to the Hill Cryptographic System. - Cryptologia, Vol. 7, 1983, No 1, 63-78.10.1080/0161-118391857793Search in Google Scholar

18. Levine, J., R. Chandler. The Hill Cryptographic System with Unknown Cipher Alphabet, But Known Plaintext. - Cryptologia, Vol. 13, 1989, No 1, 1-28.10.1080/0161-118991863736Search in Google Scholar

19. Kiele, W. A. A Tensor-Theoretic Enhancement to the Hill Cipher System. - Cryptologia, Vol. 14, 1990, No 3, 225-233.10.1080/0161-119091864931Search in Google Scholar

20. Thilaka, B., K. Rajalakshmi. An Extension of Hill Cipher Using Generalized Inverses and mth Residue modulo n. - Cryptologia, Vol. 29, 2005, No 4, 267-276.10.1080/0161-110591893933Search in Google Scholar

21. Saeednia, S. How to Make the Hill Cipher Secure. - Cryptologia, Vol. 24, 2000, No 4, 353-360.10.1080/01611190008984253Search in Google Scholar

22. Yeh, Y. S., T. C. Wu, C. C. Chang, W. C. Yang. A New Cryptosystem Using Matrix Transformation. - In: Proceedings of the 25th IEEE International Carnahan Conference on Security Technology, 1991, 131-138.Search in Google Scholar

23. Mahmoud, A. Y., A. G. Chefranov. Hill Cipher Modification Based on Eigenvalues HCMEE. - In: Proceedings of the Second International Conference on Security of Information and Networks (SIN2009), Gazimagusa (TRNC) North Cyprus, A. Elci, M. Orgun, A. Chefranov, (Eds) ACM, New York, USA, 2009, 164-167.10.1145/1626195.1626237Search in Google Scholar

24. Mahmoud, A. Y., A. G. Chefranov. Hill Cipher Modification Based on Pseudo-Random Eigenvalues. - Fourth coming paper, to appear in Applied Mathematics & Information Sciences.Search in Google Scholar

25. Lin, C. H., C. Y. Lee, C. Y. Lee. Comments on Saeednia's Improved Scheme for the Hill Cipher. - Journal of the Chinese Institute of Engineers, Vol. 27, 2004, No 5, 743-746.10.1080/02533839.2004.9670922Search in Google Scholar

26. Toorani, M., A. Falahati. A Secure Cryptosystem Based on Affine Transformation. - Journal of Security and Communication Networks, Vol. 4, 2011, No 2, 207-215.10.1002/sec.137Search in Google Scholar

27. Toorani, M., A. Falahati. A Secure Variant of the Hill Cipher. - In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC’09), July 2009, 313-316.10.1109/ISCC.2009.5202241Search in Google Scholar

28. Overbey, J., W. Traves, J. Wojdylo. On the Keyspace of the Hill Cipher. - Cryptologia, Vol. 29, 2005, No 1, 59-72.10.1080/0161-110591893771Search in Google Scholar

29. Bauer, C., K. Millward. Cracking Matrix Encryption Row by Row. - Cryptologia, Vol. 31, 2007, 76-83. 10.1080/01611190600947806Search in Google Scholar

eISSN:
1314-4081
ISSN:
1311-9702
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, Information Technology