Blakely’s secret sharing scheme
| Main Authors: | Mahmood Al Dabbagh, Sufyan Salim, Alshaikhli, Imad Fakhri Taha, Israfil, Muhammad |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20669/ http://irep.iium.edu.my/20669/1/C22_-_blakely%27s_secret.pdf |
Similar Items
Shamir’s threshold scheme
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Introduction
by: Israfil, Muhammad, et al.
Published: (2011)
by: Israfil, Muhammad, et al.
Published: (2011)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Digital signature algorithm
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2016)
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2016)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)
by: Hoo, Mei Hui
Published: (2014)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Perfect secret sharing scheme based on vertex domination set
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
Introduction
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
Message Digest (MDx) family
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
RIPEMD and Chameleon hash function
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Crossing the Irish Sea and Blake
by: Kinsella, John
Published: (2016)
by: Kinsella, John
Published: (2016)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
The Mystic Communities of William Blake and W. B. Yeats: Shared Spiritual Influences and Legacies
by: Marley, Jodie Lorna
Published: (2023)
by: Marley, Jodie Lorna
Published: (2023)
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
An improved information rate of perfect secret sharing scheme based on dominating set of vertices
by: Al-Saidi, Nadia M. G., et al.
Published: (2013)
by: Al-Saidi, Nadia M. G., et al.
Published: (2013)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
Improving the cost factor of DLBCA lightweight block cipher algorithm
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018)
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018)
A novel secret key generation based on image link
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
Blackbirds and Blake's Illustrations to Dante's Purgatorio Canto 1
by: Kinsella, John
Published: (2016)
by: Kinsella, John
Published: (2016)
Feige-Fiat-Shamir identification scheme
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
The influence of Internet and social media on purchasing
decisions in Indonesia and a comparison between
Indonesia and Kuwait
by: al-enizi, Khalid, et al.
Published: (2019)
by: al-enizi, Khalid, et al.
Published: (2019)
A deconstructionist reading of William Blake's A Poison Tree
by: Davood Mashhadi Heidar,, et al.
Published: (2012)
by: Davood Mashhadi Heidar,, et al.
Published: (2012)
'Words of wisdom': text, voice and justice in I, Daniel Blake
by: Jones, Susan
Published: (2017)
by: Jones, Susan
Published: (2017)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
Phd journey: from problem statement to viva
by: Alshaikhli, Imad Fakhri Taha
Published: (2020)
by: Alshaikhli, Imad Fakhri Taha
Published: (2020)
Similar Items
-
Shamir’s threshold scheme
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
Introduction
by: Israfil, Muhammad, et al.
Published: (2011) -
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014) -
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013) -
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)