14
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A Block Cipher using an Iterative Method involving a Permutation

&
Pages 275-292 | Received 01 Aug 2012, Published online: 02 Jun 2015

References

  • William Stallings, “Cryptography and Network Security: Principles and Practices”, Third edition, Chapter 2, pp.37.
  • Feistel, H. “Cryptography and Computer Privacy”, Scientific American, vol. 228, No. 5, pp.15–23, 1973.
  • Feistel, H., Notz. W., and Smith, J. “Some Cryptographic Techniques for Machine-to-Machine Data Communications”, Proceedings of the IEEE, vol. 63, No. 11, pp. 1545–1554, Nov. 1975.
  • V. U. K. Sastry, V. Janaki, “On the Modular Arithmetic Inverse in the Cryptology of Hill Cipher”, Proceedings of North American Technology and Business Conference, September 2005, Montreal, Canada.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.