Academic literature on the topic 'Hill cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hill cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hill cipher"
Sreeja and Kumar Sharma Mohit. "Advanced Encryption Standard (AES) and Hill Cipher: A Comparative Study." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 1983–85. https://doi.org/10.5281/zenodo.7553080.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textWijayanti, Dian Eka. "BEBERAPA MODIFIKASI PADA ALGORITMA KRIPTOGRAFI AFFINE CIPHER." Journal of Fundamental Mathematics and Applications (JFMA) 1, no. 2 (2018): 64. http://dx.doi.org/10.14710/jfma.v1i2.19.
Full textPan, Yining. "The Scope of Application of Letter Frequency Analysis in Substitution Cipher." Journal of Physics: Conference Series 2386, no. 1 (2022): 012015. http://dx.doi.org/10.1088/1742-6596/2386/1/012015.
Full textSukma Achriadi, Hardisal, Asmaidi, and M. Sulthan Hanafi. "Encryption and Description of RGB Values in Images Using the Hill Chiper Algorithm." Jurnal Inotera 9, no. 1 (2024): 48–52. http://dx.doi.org/10.31572/inotera.vol9.iss1.2024.id282.
Full textMihaylov, Deyan. "Cryptography and Cryptanalysis in MS EXCEL." Mathematics and Informatics LXV, no. 1 (2022): 53–71. http://dx.doi.org/10.53656/math2022-1-4-kri.
Full textPandey, Ashish. "TRANSPOLY HILL CIPHER — AN IMPROVEMENT OVER TRADITIONAL HILL CIPHER." International Journal of Advanced Research in Computer Science 9, no. 1 (2018): 276–78. http://dx.doi.org/10.26483/ijarcs.v9i1.5206.
Full textNugraha, Yuniardi Wahyu, Thresye Thresye, and Oni Soesanto. "MODIFIKASI HILL CIPHER DENGAN MENGGUNAKAN MATRIKS KUNCI ORTHOGONAL DAN TRANSPOSITION SUBSTITUTION LEFT RIGHT SHIFT (TSLRS)." EPSILON: JURNAL MATEMATIKA MURNI DAN TERAPAN 17, no. 1 (2023): 133. http://dx.doi.org/10.20527/epsilon.v17i1.9232.
Full textMujaddid, Azzam, and Sumarsono Sumarsono. "A Modifying of Hill Cipher Algorithm with 3 Substitution Caesar Cipher." Proceeding International Conference on Science and Engineering 1 (October 31, 2017): 157–63. http://dx.doi.org/10.14421/icse.v1.294.
Full textTuasikal, Abdul Rauf, Dolly Indra, and Farniwati Fattah. "Analisis Perbandingan Known Plaintext dan Chosen Plaintext Pada Metode Hill Chiper." Buletin Sistem Informasi dan Teknologi Islam 1, no. 1 (2020): 1–5. http://dx.doi.org/10.33096/busiti.v1i1.514.
Full textDissertations / Theses on the topic "Hill cipher"
Porto, Victor Monteiro Ferreira. "Criptografia: Da origem aos dias atuais." Universidade do Estado do Rio de Janeiro, 2015. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=9182.
Full textMillan, William L. "Analysis and design of Boolean functions for cryptographic applications." Thesis, Queensland University of Technology, 1997.
Find full textChih, Chu Te, and 朱德智. "An Improvement of Hill Cipher." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/71700187081939569849.
Full textChen, Chin Kuang, and 陳勤廣. "A Novel Steganography Using Hill Cipher and Microarray Images." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/44579276195478075474.
Full textFerreira, Moisés Alfredo da Cunha. "Implementing and Evaluating Nonsingular Matrices Generators for the Hill Cipher." Master's thesis, 2018. http://hdl.handle.net/10400.6/10045.
Full textMahapatra, Amogh, and Rajballav Dash. "Data Encryption and Decryption Using Hill Cipher Method and Self Repetitive Matrix." Thesis, 2007. http://ethesis.nitrkl.ac.in/68/1/10307021.pdf.
Full textMajhi, Jyotirmayee. "Modified Hill-Cipher and CRT Methods in Galois Field GF (2^M)for Cryptography." Thesis, 2009. http://ethesis.nitrkl.ac.in/1516/1/jyoti.pdf.
Full textYellapu, Naveen Kumar, and Bikkina Narendra. "Modification of Hill Cipher Technique using Self Repetitive Matrix (Modular Arithmatic) and Correlation of Eigen values of Matrix with the Exponent N." Thesis, 2008. http://ethesis.nitrkl.ac.in/77/1/Yellapu.pdf.
Full textBooks on the topic "Hill cipher"
Book chapters on the topic "Hill cipher"
Rubinstein-Salzedo, Simon. "The Hill Cipher." In Springer Undergraduate Mathematics Series. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8_6.
Full textBasavaiah, Jagadeesh, Audre Arlene Anthony, and Chandrashekar Mohan Patil. "Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques." In Advances in VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0443-0_34.
Full textNikitakos, Nikitas V. "Hill cipher application to Multimedia Security." In IFIP Advances in Information and Communication Technology. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34943-5_17.
Full textVishwa Nageshwar, K., and N. Ravi Shankar. "Cryptanalysis of Modification in Hill Cipher for Cryptographic Application." In Algorithms for Intelligent Systems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5243-4_62.
Full textH.S., Sharath Kumar, Panduranga H.T., and Naveen Kumar S.K. "Hybrid Approach for Image Encryption Using Hill Cipher Technique." In Wireless Networks and Computational Intelligence. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31686-9_23.
Full textAhmed, Mervat, Hatem S. Abdul-kader, Arabi kishk, and Azza A. Abdo. "An Efficient Multi Secret Image Sharing Scheme Using Hill Cipher." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44289-7_57.
Full textRajvir, Chintan, Swapnil Satapathy, S. Rajkumar, and L. Ramanathan. "Image Encryption Using Modified Elliptic Curve Cryptography and Hill Cipher." In Smart Intelligent Computing and Applications. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9282-5_64.
Full textMishra, Girish, and Sarvjeet Kaur. "Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing." In Advances in Intelligent Systems and Computing. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2220-0_23.
Full textKhalaf, Rifaat Z., Hamza B. Habib, and Sarkesh Khalid Aljaff. "Attacking the Application of Three-Pass Protocol in Hill-Cipher." In Lecture Notes in Networks and Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0666-3_12.
Full textRrghout, Hicham, Mourad Kattass, Naima Benazzi, Mariem Jarjar, Abdellatif Jarjar, and Abdelhamid Benazzi. "Image Encryption Using Hill Cipher Under a Chaotic Vector's Control." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68650-4_29.
Full textConference papers on the topic "Hill cipher"
Maurya, Sarvesh, Rai Shekhar, and Mahadev Ajagalla. "Cancellable Biometric Template Generation Using Vector Quantization and Hill Cipher." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803153.
Full textKalpana, P., P. Sumathi, Teena Jose, S. Deepa, I. Priya Stella Mary, and B. Manimekala. "Enhanced Hill Cipher Algorithm with Novel Encoding and Key Generation." In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS). IEEE, 2024. https://doi.org/10.1109/iciics63763.2024.10859586.
Full textChilakala, Hema Srivarshini, N. Preeti, and Murali K. "Advanced Hill Cipher Hybrid Cryptography Model." In 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon). IEEE, 2022. http://dx.doi.org/10.1109/nkcon56289.2022.10126741.
Full textParagas, Jessie R., Ariel M. Sison, and Ruji P. Medina. "Hill Cipher Modification: A Simplified Approach." In 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN). IEEE, 2019. http://dx.doi.org/10.1109/iccsn.2019.8905360.
Full textBorodzhieva, Adriana. "MS EXCEL-BASED APPLICATION FOR ENCRYPTION AND DECRYPTION USING THE HILL CIPHER ON THE BASIS OF 2X2-MATRIX AND 64-SYMBOL ALPHABET." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-049.
Full textMahendran, R., and K. Mani. "Generation of Key Matrix for Hill Cipher Encryption Using Classical Cipher." In 2017 World Congress on Computing and Communication Technologies (WCCCT). IEEE, 2017. http://dx.doi.org/10.1109/wccct.2016.22.
Full textWang, Xinyu, and Zhaoe Min. "Parallel algorithm for Hill Cipher on MapReduce." In 2014 International Conference on Progress in Informatics and Computing (PIC). IEEE, 2014. http://dx.doi.org/10.1109/pic.2014.6972384.
Full textToorani, Mohsen, and Abolfazl Falahati. "A secure variant of the Hill Cipher." In 2009 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2009. http://dx.doi.org/10.1109/iscc.2009.5202241.
Full textHaridas, Deepthi, Sarma Venkataraman, and Geeta Varadan. "Strengthened Iterated Hill Cipher for encrypted processing." In 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2012. http://dx.doi.org/10.1109/pdgc.2012.6449870.
Full textHong, MengZe, and Wing Loon Chee. "Hill Cipher Modifications and Dynamic Cryptosystem Design." In 2023 7th International Conference on Cryptography, Security and Privacy (CSP). IEEE, 2023. http://dx.doi.org/10.1109/csp58884.2023.00036.
Full textReports on the topic "Hill cipher"
Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada581720.
Full text