An overview of cryptosystems based on finite automata
Finite automata are backbones of the cryptosystems based on language theory. Most of the cryptosystems based on grammars and word problems are either insecure or do not satisfy digital signature prosperities. Basically, the cryptosystems based on automata are classified into cryptosystems based on:...
| Main Authors: | Khaleel, Ghassan, Turaev, Sherzod, Alshaikhli, Imad Fakhri Taha, Mohd Tamrin, Mohd Izzuddin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Akademia Baru
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/52954/ http://irep.iium.edu.my/52954/1/ARSRV27_N1_P1_7.pdf |
Similar Items
A symmetric cryptosystem based on nondeterministic finite automata
by: Khaleel, Ghassan, et al.
Published: (2017)
by: Khaleel, Ghassan, et al.
Published: (2017)
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
A performance improvement of Dömösi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
A performance improvement of Domosi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2015)
by: Khaleel, Ghassan, et al.
Published: (2015)
Performance and security improvements of Dӧmӧsi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
A comparative performance analysis of modified Dӧmӧsi’s cryptosystem and data encryption standard
by: Khaleel, Ghassan, et al.
Published: (2017)
by: Khaleel, Ghassan, et al.
Published: (2017)
Weighted Watson-Crick Automata
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
Weighted Watson-Crick automata
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2014)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2014)
Automata diagram for finite groups
by: Fong, Wan Heng, et al.
Published: (2013)
by: Fong, Wan Heng, et al.
Published: (2013)
Weighted Watson-crick automata and applications in halal authentication
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
Automata for subgroups
by: Fong, Wan Heng, et al.
Published: (2014)
by: Fong, Wan Heng, et al.
Published: (2014)
Automata diagram for groups
by: Gan, Yee Siang, et al.
Published: (2013)
by: Gan, Yee Siang, et al.
Published: (2013)
Permutation groups in automata diagrams
by: Gan, Yee Siang, et al.
Published: (2013)
by: Gan, Yee Siang, et al.
Published: (2013)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Automata representation for Abelian groups
by: Fong, Wan Heng, et al.
Published: (2013)
by: Fong, Wan Heng, et al.
Published: (2013)
Computational properties of Watson-Crick context-free grammars
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
Geometrical representation of automata over some abelian groups
by: Gan, Yee Siang, et al.
Published: (2012)
by: Gan, Yee Siang, et al.
Published: (2012)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
Nonterminal complexity of weakly conditional grammars
by: Turaev, Sherzod, et al.
Published: (2014)
by: Turaev, Sherzod, et al.
Published: (2014)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Nonlinear consensus for multi-agent systems using positive intractions of doubly stochastic quadratic operators
by: Abdulghafor, Rawad, et al.
Published: (2016)
by: Abdulghafor, Rawad, et al.
Published: (2016)
Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
CSA 402 - FINITE AUTOMATA AND FORMAL LANGUAGES MAC-APR 1996.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
Fuzzy !-automata and its relationships
by: Cokilavany, R., et al.
Published: (2015)
by: Cokilavany, R., et al.
Published: (2015)
Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos)
by: Hassan, Raini, et al.
Published: (2017)
by: Hassan, Raini, et al.
Published: (2017)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Similar Items
-
A symmetric cryptosystem based on nondeterministic finite automata
by: Khaleel, Ghassan, et al.
Published: (2017) -
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016) -
A performance improvement of Dömösi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016) -
A performance improvement of Domosi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2015) -
Performance and security improvements of Dӧmӧsi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016)