2021
DOI: 10.1080/09720529.2020.1838744
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography using generalized Fibonacci matrices with Affine-Hill cipher

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 20 publications
(24 citation statements)
references
References 10 publications
0
24
0
Order By: Relevance
“…holds but in other cases, it does not hold, some of such observations has been found in [8,13,16,22,23].…”
Section: Introductionmentioning
confidence: 89%
“…holds but in other cases, it does not hold, some of such observations has been found in [8,13,16,22,23].…”
Section: Introductionmentioning
confidence: 89%
“…Then the cipher text converted to decimal. The result of decimal is re-encrypted using the Hill Cipher method generate Cipher text [3].To process the description or return to the original message with the process carried out it is the opposite of the encryption process, if in the first encryption process with the Caesar Cipher method then on the first description process is the Hill Cipher method [4].…”
Section: Methodsmentioning
confidence: 99%
“…2.2 Generalized Fibonacci Matrix [11] Definition 2.2. The generalized Fibonacci sequence of order n is defined by the recurrence relation,…”
Section: Preliminariesmentioning
confidence: 99%
“…Kalika et.al. [11] proposed a public key cryptography based on generalized Fibonacci matrices where they also discussed properties of Fibonacci matrices. Nowadays dependency of the people across the world on the internet has been increased.…”
Section: Introductionmentioning
confidence: 99%