Return to Article Details Keyword Security Implementation Based on Hill Cipher Optimized Using Genetic Algorithms Download Download PDF