Hill cipher

Results: 34



#Item
31Constrained writing / Word square / Four-square cipher / Computer programming / Computing / Software engineering

Diversity and Evenness: A Unifying Notation and Its Consequences M. O. Hill Ecology, Vol. 54, No. 2. (Mar., 1973), pp[removed].

Add to Reading List

Source URL: intranet.catie.ac.cr

Language: English - Date: 2010-03-10 12:07:59
32Vigenère cipher / Hill cipher / Cryptanalysis / Rotor machine / Caesar cipher / Symmetric-key algorithm / Atbash / Enigma machine / Data Encryption Standard / Cryptography / Substitution cipher / Cipher

History of Cryptography This article is dedicated to a short history of cryptography, from ancient times to our days, without the

Add to Reading List

Source URL: www.logicalsecurity.com

Language: English - Date: 2008-09-10 02:14:47
33Matrices / Matrix theory / Binary operations / Numerical linear algebra / Matrix / Hill cipher / Invertible matrix / Multiplication / Identity matrix / Algebra / Mathematics / Linear algebra

PDF Document

Add to Reading List

Source URL: massey.limfinity.com

Language: English - Date: 2011-11-04 15:51:54
34Group theory / Public-key cryptography / Hill cipher / Substitution cipher / Playfair cipher / RSA / Multiplicative order / Modulo / Cipher / Cryptography / Abstract algebra / Modular arithmetic

PDF Document

Add to Reading List

Source URL: www.apprendre-en-ligne.net

Language: English - Date: 2006-08-01 04:04:38
UPDATE