Description: Hash encryption algorithm to achieve the solution circulating in the matrix, can quickly produce the desired matrix, and thus the encrypted file. And Fourier transforms.
To Search:
File list (Check if you may need any files):
cyclic matrix.txt
factorial.m
qcycle.m