Some applications of high-speed computers to the case $n = 2$ of Algebraic Cryptography
HTML articles powered by AMS MathViewer
- by Jack Levine PDF
- Math. Comp. 15 (1961), 254-260 Request permission
References
- Lester S. Hill, Cryptography in an Algebraic Alphabet, Amer. Math. Monthly 36 (1929), no. 6, 306–312. MR 1521759, DOI 10.2307/2298294
- Lester S. Hill, Concerning Certain Linear Transformation Apparatus of Cryptography, Amer. Math. Monthly 38 (1931), no. 3, 135–154. MR 1522201, DOI 10.2307/2300969
- Jack Levine, Variable matrix substitution in algebraic cryptography, Amer. Math. Monthly 65 (1958), 170–179. MR 106793, DOI 10.2307/2310059
Additional Information
- © Copyright 1961 American Mathematical Society
- Journal: Math. Comp. 15 (1961), 254-260
- DOI: https://doi.org/10.1090/S0025-5718-61-99216-X