Revision as of 11:18, 18 September 2008 by Pjcannon (Talk)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Part C: Application of Linearity

1. Bob can decrypt the message by multiplying it (in groups of 3 numbers) by the inverse of the 3-by-3 secret matrix.

Alumni Liaison

Recent Math PhD now doing a post-doctorate at UC Riverside.

Kuei-Nuan Lin