Beberapa Penggunaan Teori Nombor dalam Kriptografi
Penyelidikan yang dilakukan meliputi penggunaan Teori Nombor dalam bidang kriptografi. Melalui penggunaan konsep aritmetik modulo, beberapa kaedah pengkriptanan dibangunkan berorientasikan sistem Saifer Digrafik, RSA (Ron Rivest, Adi Shamir dan Leonard Adleman) dan LUC (fungsi Lucas jadi semula...
| Main Author: | Yunos, Faridah |
|---|---|
| Format: | Thesis |
| Language: | English Malay |
| Published: |
2001
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/9322/ http://psasir.upm.edu.my/id/eprint/9322/1/FSAS_2001_55.pdf |
Similar Items
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
Prediction of Onset Fluidization Using Critical Rayleigh Number.
by: Tan, Yee Wan
Published: (2004)
by: Tan, Yee Wan
Published: (2004)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
Teori nombor
by: Maselan @ Mazlan, Ali, et al.
Published: (2017)
by: Maselan @ Mazlan, Ali, et al.
Published: (2017)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
by: Ahmad, Miza Mumtaz
Published: (2011)
by: Ahmad, Miza Mumtaz
Published: (2011)
Kajian Beberapa Aspek Pengkuturan Kupang (Perna Viridis L.,1758) Di Perairan Sebatu, Melaka
by: Mohammad Ramli, Mohammad Saufi
Published: (2005)
by: Mohammad Ramli, Mohammad Saufi
Published: (2005)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
Gabungan Kriptografi Lengkuk Eliptik dan Saifer Hill dalam perutusan imej berskala samar
by: Yunos, Faridah, et al.
Published: (2022)
by: Yunos, Faridah, et al.
Published: (2022)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
by: Abubakar, Saidu Isah
Published: (2018)
by: Abubakar, Saidu Isah
Published: (2018)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Falsafah Program Pembangunan Insan: Anutan Di Beberapa Buah Agensi Di Malaysia
by: Abd. Rahman, Jaafar
Published: (1996)
by: Abd. Rahman, Jaafar
Published: (1996)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Parameterization of nice polynomials
by: Anton, Hozjee
Published: (2018)
by: Anton, Hozjee
Published: (2018)
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014)
by: Tea, Boon Chian
Published: (2014)
On the diophantine equation p ͯ +qᵐnᵞ = z²
by: Bakar, Halimatun Saadiah
Published: (2018)
by: Bakar, Halimatun Saadiah
Published: (2018)
Pengaruh Beberapa Media Terhadap Tumbesaran dan Hasil Timun (Cucumis Satlvus L.) Menerusi Sistem Pengairan Titis
by: Yusfar, Nova Rachmani
Published: (2003)
by: Yusfar, Nova Rachmani
Published: (2003)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)
by: Wong, Tze Jin
Published: (2011)
MGM502 - Number Theory
(Teori Nombor)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2019)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2019)
Multi-base number representation in application to scalar multiplication and pairing computation
by: Mohammed Ismail, Abdelwahed
Published: (2011)
by: Mohammed Ismail, Abdelwahed
Published: (2011)
Similar Items
-
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003) -
Prediction of Onset Fluidization Using Critical Rayleigh Number.
by: Tan, Yee Wan
Published: (2004) -
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021) -
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006) -
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)