GROSU, V.A. (2013). Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime, 2(2), 19-26. Retrieve from https://www.ijisc.comGROSU, V.A., 2013. Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime 2(2), 19-26. Available from: https://www.ijisc.comV.A. GROSU, "Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 19-26, 2013. Available: https://www.ijisc.comGROSU, V.A., 'Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 19-26, (2013).GROSU, V.A.: Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime 2 (2013) 19-26. https://www.ijisc.comGROSU, V.A., (2013), Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime, 2: 19-26. https://www.ijisc.com Citation Format :