Line 1: Line 1:
[[Homework 3_ECE301Fall2008mboutin]] -  
+
[[Homework 3_ECE301Fall2008mboutin]] - [[HW3.A Allen Humphreys_ECE301Fall2008mboutin|'''A''']] - [[HW3.B Allen Humphreys_ECE301Fall2008mboutin|'''B''']] - [[HW3.C Allen Humphreys_ECE301Fall2008mboutin|'''C''']]
[[HW3.A Allen Humphreys_ECE301Fall2008mboutin|'''A''']] -  
+
 
[[HW3.B Allen Humphreys_ECE301Fall2008mboutin|'''B''']] -  
+
1. Assuming the secret matrix is invertible, Bob can find the inverse of the secret matrix and apply it to the secret message 3 elements at a time just as the original matrix is applied to the original string.
[[HW3.C Allen Humphreys_ECE301Fall2008mboutin|'''C''']]
+
 
 +
2. Yes, though I'm not sure how right now.

Revision as of 13:49, 19 September 2008

Homework 3_ECE301Fall2008mboutin - A - B - C

1. Assuming the secret matrix is invertible, Bob can find the inverse of the secret matrix and apply it to the secret message 3 elements at a time just as the original matrix is applied to the original string.

2. Yes, though I'm not sure how right now.

Alumni Liaison

Ph.D. 2007, working on developing cool imaging technologies for digital cameras, camera phones, and video surveillance cameras.

Buyue Zhang