New formula to calculate the number of designs in RADG cryptosystem
Reaction automata direct graph (RADG) is a new technique that uses the automata direct graph method to represent a certain design for encryption and decryption. Jump states are available in the RADG design that enables the encipher to generate different ciphertexts each time from the same plaintext...
| Main Authors: | Kadhum, Laith M., Ahmad Firdaus, Zainal Abidin, Mohamad Fadli, Zolkipli, Saferalia, Luay, Mohd Faizal, Ab Razak |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Semnan University
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/34007/ http://umpir.ump.edu.my/id/eprint/34007/1/New%20formula%20to%20calculate%20the%20number%20of%20designs%20in%20RADG.pdf |
Similar Items
Auto–transition in RADG based on chaotic system
by: Kadhum, Laith M., et al.
Published: (2023)
by: Kadhum, Laith M., et al.
Published: (2023)
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
by: Alfaris, Rand Qusay
Published: (2009)
by: Alfaris, Rand Qusay
Published: (2009)
New developed formula to calculate the permittivity of ferrite-polymer composite
by: Al-Habashi, Ramadan, et al.
Published: (2013)
by: Al-Habashi, Ramadan, et al.
Published: (2013)
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008)
by: Alfaris, Rand, et al.
Published: (2008)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
Fast Public-Key Cryptosystems: Design And Cryptanalyses
by: Go, Bok Min
Published: (2006)
by: Go, Bok Min
Published: (2006)
An analysis of a private-key cryptosystem / by Tan Wei-Wey.
by: Tan, Wei-Wey
Published: (2002)
by: Tan, Wei-Wey
Published: (2002)
The prediction of undergraduate student performance in chemistry course using multilayer perceptron
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
New algorithm to reduce the number of computing steps in reliability formula of weighted-k-out-of-n system
by: Higashiyama, Yoichi, et al.
Published: (2007)
by: Higashiyama, Yoichi, et al.
Published: (2007)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
A new cryptosystem analogous to LUCELG and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2009)
by: Muslim, Norliana, et al.
Published: (2009)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Cubature formula for approximate calculation of integrals of two-dimensional irregular highly oscillating functions
by: Mezhuyev, Vitaliy, et al.
Published: (2018)
by: Mezhuyev, Vitaliy, et al.
Published: (2018)
System Usability Scale Formula as Alternative for
Calculating Composite Score of Likert-type Items
by: Stephen, Donald, et al.
Published: (2015)
by: Stephen, Donald, et al.
Published: (2015)
Thermodynamics of Condensed Phases: Formula Unit Volume, Vm, and the Determination of the Number of Formula Units, Z, in a Crystallographic Unit Cell
by: Glasser, Leslie
Published: (2011)
by: Glasser, Leslie
Published: (2011)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Key exchange for new cryptosystem analogous to LUCELG
and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2013)
by: Muslim, Norliana, et al.
Published: (2013)
A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
by: Saba, M. Ismail, et al.
Published: (2018)
by: Saba, M. Ismail, et al.
Published: (2018)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Reynolds number calculation method for aerobic biological
porous packed reactors
by: Fatihah Suja’,, et al.
Published: (2006)
by: Fatihah Suja’,, et al.
Published: (2006)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
A new computation algorithm for a cryptosystem based on Lucas Functions
by: Othman, Mohamed, et al.
Published: (2008)
by: Othman, Mohamed, et al.
Published: (2008)
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023)
by: Hussain, Syed Shuja, et al.
Published: (2023)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
Design of a new hybrid artificial neural network method based on decision trees for calculating the Froude number in rigid rectangular channels
by: Isa Ebtehaj, et al.
Published: (2016)
by: Isa Ebtehaj, et al.
Published: (2016)
Design of a new hybrid artificial neural network method based on decision trees for calculating the Froude number in rigid rectangular channels
by: Ebtehaj, Isa, et al.
Published: (2016)
by: Ebtehaj, Isa, et al.
Published: (2016)
Development of online fuel consumption cost calculator
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Similar Items
-
Auto–transition in RADG based on chaotic system
by: Kadhum, Laith M., et al.
Published: (2023) -
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
by: Alfaris, Rand Qusay
Published: (2009) -
New developed formula to calculate the permittivity of ferrite-polymer composite
by: Al-Habashi, Ramadan, et al.
Published: (2013) -
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008) -
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)