Finite and infinite field cryptography analysis and applications
Most of the currently used cryptosystems are defined over finite fields and use modular arithmetic. Their security is often based on the difficulty of solving certain number theoretic problems. In recent years, a large amount of work for introducing of systems defined on infinite field in the desig...
| Main Authors: | Mohammed G. Al-Saidi, Nadia, Md. Said, Mohamad Rushdan, Mohammed, Arkan J. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/39922/ http://psasir.upm.edu.my/id/eprint/39922/1/39922.pdf |
Similar Items
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
History, development and trend of Fractal based biometric cryptography
by: Labu, Md Ahadullah, et al.
Published: (2015)
by: Labu, Md Ahadullah, et al.
Published: (2015)
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
Static and dynamic analysis of rockfill dam using finite-infinite element method
by: Noorzaei, Jamaloddin, et al.
Published: (2005)
by: Noorzaei, Jamaloddin, et al.
Published: (2005)
Numerical Solution of Infinite and Finite Boundary Integral Equations by Polynomials
by: Abdul Sathar, Mohammad Hasan
Published: (2010)
by: Abdul Sathar, Mohammad Hasan
Published: (2010)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
Biometric identification using local iterated function
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
An improved fuzzy fractal dimension for texture analysis
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Classification of leibniz algebras over finite fields
by: Mohammed, Mohammed Ardo
Published: (2019)
by: Mohammed, Mohammed Ardo
Published: (2019)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
A new approach in cryptographic systems using fractal image coding
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
A new idea in zero knowledge protocols based on iterated function systems
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2011)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2011)
An e-voting application using cryptography technology
by: Chin, Hsin Tien
Published: (2020)
by: Chin, Hsin Tien
Published: (2020)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
New approach of cryptography algorithm for e- mail applications
by: Khmag, Asem, et al.
Published: (2005)
by: Khmag, Asem, et al.
Published: (2005)
Infinite series
by: Elfaki, Faiz Ahmed Mohamed, et al.
Published: (2011)
by: Elfaki, Faiz Ahmed Mohamed, et al.
Published: (2011)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Efficiency analysis for public key systems based on fractal functions.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Fractal attractor based digital signature
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
On the security of digital signature protocol based on iterated function systems.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Improved digital signature protocol using iterated function systems.
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
A generalized fractal dimension as an image feature
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
Numerical modeling of railway track supporting system using finite-infinite and thin layer elements
by: Noorzaie, Jamaloddin, et al.
Published: (2009)
by: Noorzaie, Jamaloddin, et al.
Published: (2009)
Multipartite Gaussian steering: monogamy constraints and quantum cryptography applications
by: Xiang, Yu, et al.
Published: (2017)
by: Xiang, Yu, et al.
Published: (2017)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Number theoretical foundations in cryptography
by: Mohd Atan, Kamel Ariffin
Published: (2016)
by: Mohd Atan, Kamel Ariffin
Published: (2016)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Interpretation: The Infinite Controversy
by: S. Sultan, Sabbar
Published: (2010)
by: S. Sultan, Sabbar
Published: (2010)
Similar Items
-
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018) -
History, development and trend of Fractal based biometric cryptography
by: Labu, Md Ahadullah, et al.
Published: (2015) -
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)