Federal University Dutse Jigawa State

FUD Community

Browse

Now showing 1 - 1 of 1

Application of Linear Transformation to Cryptography (A case study of the Hill Cipher Encryption Algorithm)  

2018-05-20
In this project, two kinds of cryptographic techniques (i.e., symmetric and asymmetric) were. distinguished. However, the work is particularly focused on the symmetric technique which is based on linear algebra. ...

ALIYU ILIYASU MUHAMMA  

- Bachelors