
| index | Title |
| 1 | How to repair the Hill cipher Author(s):ISMAIL I.A., AMIN Mohammed, DIAB H... Clicked:6727 Download:5831 Cited:5 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.12 P.2022-2030 DOI:10.1631/jzus.2006.A2022 |
| 2 | Cryptanalysis of an image encryption scheme based on the Hill cipher Author(s):Cheng-qing LI, Dan ZHANG, Guan-ron... Clicked:7424 Download:4719 Cited:7 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1118-1123 DOI:10.1631/jzus.A0720102 |
| 3 | Comments on “How to repair the Hill cipher” Author(s):Y. RANGEL-ROMERO, R. VEGA-GARC&Iac... Clicked:7433 Download:4504 Cited:5 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.2 P.211-214 DOI:10.1631/jzus.A072143 |