Number theoretical foundations in cryptography
In recent times the hazards in relationships among entities in different establishments worldwide have generated exciting developments in cryptography. Central to this is the theory of numbers. This area of mathematics provides very rich source of fundamental materials for constructing secret codes....
| Main Author: | Mohd Atan, Kamel Ariffin |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
AIP Publishing
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/57478/ http://psasir.upm.edu.my/id/eprint/57478/1/Number%20theoretical%20foundations%20in%20cryptography.pdf |
Similar Items
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
The fascinating numbers
by: Mohd Atan, Kamel Ariffin
Published: (1996)
by: Mohd Atan, Kamel Ariffin
Published: (1996)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
An introduction to the theoretical foundations of Islamic transactions
by: Saleem, Muhammad Yusuf
Published: (2009)
by: Saleem, Muhammad Yusuf
Published: (2009)
An introduction to the theoretical foundations of Islamic transactions
by: Saleem, Muhammad Yusuf
Published: (2010)
by: Saleem, Muhammad Yusuf
Published: (2010)
The methodological and theoretical foundations of decision support
by: Arnott, David, et al.
Published: (2007)
by: Arnott, David, et al.
Published: (2007)
The beta-transformation: a case study for chaos based cryptography
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
On some new properties of catalan numbers.
by: Sattarovich, Rakhimov Isamiddin, et al.
Published: (2012)
by: Sattarovich, Rakhimov Isamiddin, et al.
Published: (2012)
On the domination number of some graphs.
by: Alikhani, Saeid, et al.
Published: (2008)
by: Alikhani, Saeid, et al.
Published: (2008)
The theoretical foundations and rationale for source-based taxation
by: Pinto, Dale
Published: (2003)
by: Pinto, Dale
Published: (2003)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Islamic theoretical foundations of excellence / diligence (Arabic language)
by: Bensaid, Benaouda
Published: (2012)
by: Bensaid, Benaouda
Published: (2012)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
Relation between square and centered pentagonal numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2012)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2012)
Theoretical Foundation On Women Trafficking In Malaysia:
A Legal Implication
by: Rahim, Rohani Abdul, et al.
Published: (2016)
by: Rahim, Rohani Abdul, et al.
Published: (2016)
Toward Foundations of Near Sets: (Pre-)Sheaf Theoretic Approach
by: Wolski, Marcin
Published: (2013)
by: Wolski, Marcin
Published: (2013)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Theoretical foundation and numerical analysis on Coandă effect for micro-air vehicle
by: Ahmed, Riyadh Ibraheem
Published: (2016)
by: Ahmed, Riyadh Ibraheem
Published: (2016)
Theoretical Foundation Of Sexual Bribery At Workplace: A Social Legal Perspective
by: Rahim, Rohani Abdul, et al.
Published: (2016)
by: Rahim, Rohani Abdul, et al.
Published: (2016)
The halal food strategy in Islam: Its theoretical foundations and contemporary applications
by: Shogar, Ibrahim Adam Ahmed
Published: (2017)
by: Shogar, Ibrahim Adam Ahmed
Published: (2017)
Value-Based Higher Education Innovation Model: A Theoretical Foundation
by: Nur Balqishanis, Zainal Abidin, et al.
Published: (2017)
by: Nur Balqishanis, Zainal Abidin, et al.
Published: (2017)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Relation between sum of 2mth powers and polynomials of triangular numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2014)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2014)
A general relation between sums of cubes and triangular pyramidal numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2011)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2011)
Pneumatic actuation of a firefighting robot: A theoretical foundation and an empirical study
by: Ajala, Mosud Taiwo, et al.
Published: (2020)
by: Ajala, Mosud Taiwo, et al.
Published: (2020)
Theoretical foundations of uncertain event prognosis and predictive Bayesian Cramer-Rao bounds
by: Acuña Ureta, David E.
Published: (2020)
by: Acuña Ureta, David E.
Published: (2020)
Beyond the screen : An exploration of theoretical foundations and paradigms in human-computer interface design
by: Usmani, Usman Ahmad, et al.
Published: (2023)
by: Usmani, Usman Ahmad, et al.
Published: (2023)
The theoretical foundations and continued rationale for source-based taxation in an electronic commerce environment
by: Pinto, Dale
Published: (2012)
by: Pinto, Dale
Published: (2012)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
Similar Items
-
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008) -
The fascinating numbers
by: Mohd Atan, Kamel Ariffin
Published: (1996) -
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010) -
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010) -
An introduction to the theoretical foundations of Islamic transactions
by: Saleem, Muhammad Yusuf
Published: (2009)