Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference9 articles.
1. Hasdiana, H., Sembiring, R. W.: Hill Cipher On Shamir's three pass protocol. In: The 3rd international conference on multidisciplinary research (ICMR) 2014 (Medan, Indonesia)
2. Mezher, L.S., Abbass, A.M.: Mixed Hill Cipher methods with triple pass protocol methods. Int. J. Electr. Comput. Eng. (IJECE) 11(5), 4449ff (2021)
3. Lang, J.: A no-key-exchange secure image sharing scheme based on Shamir’s three-pass cryptography protocol and the multiple-parameter fractional Fourier transform. Opt. Express 20(3), 2386 (2012)
4. http://fvirtman.free.fr/recueil/01_08_04_02_randshake.c.php
5. : General Security Repository National Agency for the Security of Information Systems: https://www.ssi.gouv.fr/