2Bibhudendra Acharya, Sarat Kumar Papa, Ganapati Panda. Image Encryption by Novel Cryptosystem Using Matrix Transformation [ C] //2008 First International Conference on Emerging Trends in Engineering and Technology, Chikhli, India,2008: 77-81.
3Steven S. Skiena, Miguel A. Revilla.Programming Chanllenges: The Programming Contest Training Manual (Reprint Edition) [M] .Beijing.. Springer-Verlag and Tsinghua University Press, 2009: 130-131.
3Hill, L. S. Cryptography in an Algebraic Alphabet[J]. American Math, 1929, 36(1): 306-312.
4Bibhudendra Acharya, Sarat Kumar Patra, Ganapati Panda. Image Encryption by Novel Cryptosystem Using Matrix Transformation[C]//2008 First International Conference on Emerging Trends in Engineering and Technology, Chiklali, India, 2008: 77-81.
5Panigrahy, S K Acharya, B Jena D. Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm[C]//Proceedings of the 1st International Conference on Advances in Computing, Chikhli, India, February 2008: 21-22.
3ISMAIL I.A.,AMIN Mohammed,DIAB Hossam.How to repair the Hill cipher[J].Journal of Zhejiang University-Science A(Applied Physics & Engineering),2006,7(12):2022-2030. 被引量:1