Remote Access Mathematics of Computation
Green Open Access

Mathematics of Computation

ISSN 1088-6842(online) ISSN 0025-5718(print)

 
 

 

Some applications of high-speed computers to the case $ n = 2$ of Algebraic Cryptography


Author: Jack Levine
Journal: Math. Comp. 15 (1961), 254-260
DOI: https://doi.org/10.1090/S0025-5718-61-99216-X
Full-text PDF Free Access

References | Additional Information

References [Enhancements On Off] (What's this?)

  • [1] L. S. Hill, ``Cryptography in an algebraic alphabet,'' Amer. Math. Monthly, v. 36, 1929, p. 306-312. MR 1521759
  • [2] L. S. Hill, ``Concerning certain linear transformation apparatus of cryptography,'' Amer. Math. Monthly, v. 38, 1931, p. 135-154. MR 1522201
  • [3] Jack Levine, ``Variable matrix substitution in algebraic cryptography,'' Amer. Math. Monthly, v. 65, 1958, p. 170-179. MR 0106793 (21:5524)


Additional Information

DOI: https://doi.org/10.1090/S0025-5718-61-99216-X
Article copyright: © Copyright 1961 American Mathematical Society

American Mathematical Society