1. A Modified Hill Cipher Involving Interweaving and Iteration. V. UmakantaSastry, N. Ravi Shankar, and S DurgaBhavani, International Journal of Network Security, Vol.11, No.1, 2010.
2. Extended Hill Cipher Encryption by using Transposed Interweaved Shifting Divya Rathi et al, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 1147--1151
3. I.A. Ismail, M. Amin, and H. Diab, "How to repair the Hill cipher," Journal of Zhejiang University-Science A, Vol.7, No.12, pp.2022--2030, Dec. 2006.
4. A. Bibhudendra, "Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm", International Journal of Security, vol. 1, no. 1, (2006), pp. 14--21.
5. Yeh YS, Wu TC, Chang CC, Yang WC. A New Cryptosystem Using Matrix Transformation. 25th IEEE International Carnahan Conference on Security Technology 1991: 131--138..