Cryptanalysis of an image encryption scheme based on the hill cipher
From MaRDI portal
Publication:946659
DOI10.1631/JZUS.A0720102zbMath1213.94120OpenAlexW1993906574WikidataQ123078810 ScholiaQ123078810MaRDI QIDQ946659
Dan Zhang, Cheng-Qing Li, Guan-Rong Chen
Publication date: 24 September 2008
Published in: Journal of Zhejiang University. Science A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1631/jzus.a0720102
Related Items (1)
Cites Work
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Comments on: ``How to repair the Hill cipher
- Cryptanalysis of a new signal security system for multimedia data transmission
- How to repair the Hill cipher
- ON THE KEYSPACE OF THE HILL CIPHER
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Communication Theory of Secrecy Systems*
- Advances in Neural Networks – ISNN 2005
This page was built for publication: Cryptanalysis of an image encryption scheme based on the hill cipher