Return to Article Details Cryptography based on the Matrices Download Download PDF