Farajallah, Mousa; Hamamreh, Rushdi
(Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
Many cryptosystems were designed to prevent
data from unauthorized access, and some are
relatively secure but slow. Others are fast but
relatively not secure enough. One of the most
efficient cryptosystems is Hill ...