Sistem Kripto Luc Untuk Pengesahan Aplikasi Telnet
Tesis ini membincangkan perbandingan antara dua sistem kripto kunci awam iaitu sistem kripto Rivest-Shamir-Adleman, RSA dan sistem kripto berasaskan fungsi Lucas, LUC. Perbandingan dibuat untuk aspek-aspek pelaksanaan dan keselamatan. Bagi aspek pelaksanaan, proses penjanaan kunci kriptografi, p...
| Main Author: | Sibo, Siti Jauyah |
|---|---|
| Format: | Thesis |
| Language: | English Malay |
| Published: |
1999
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/9631/ http://psasir.upm.edu.my/id/eprint/9631/1/FSKTM_1999_6_IR.pdf |
Similar Items
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
by: Abubakar, Saidu Isah
Published: (2018)
by: Abubakar, Saidu Isah
Published: (2018)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
KriptoTurko, elektronik para birimleri ile tanışırken=KriptoTurko, while acquainted with electronic currencies
by: Kayadibi, Saim
Published: (2017)
by: Kayadibi, Saim
Published: (2017)
Mata wang kripto terdedah pengganas
by: Utusan Malaysia
Published: (2018)
by: Utusan Malaysia
Published: (2018)
Slotted UHF RFID full embroidery e-textile wearable tag antenna for WBAN application
by: Dawood, Bahaa Abbas
Published: (2017)
by: Dawood, Bahaa Abbas
Published: (2017)
Split-ring resonator-based antenna with photonic band gap for UHF RFID tag
by: Erman, Fuad Naim Ahmed
Published: (2016)
by: Erman, Fuad Naim Ahmed
Published: (2016)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)
by: Wong, Tze Jin
Published: (2011)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
The development of school children monitoring system via RFID
by: Rafidah, Abd. Aziz
Published: (2006)
by: Rafidah, Abd. Aziz
Published: (2006)
Smart Shop System (S-Shop) using RFID and Iot / Amerrudin Daud
by: Daud, Amerrudin
Published: (2019)
by: Daud, Amerrudin
Published: (2019)
Grocery shopping assistant for visually impaired / Ahmad Yusri Dak, Saadiah Yahya and Nik Mariza Nik Abdull Malik
by: Dak, Ahmad Yusri, et al.
Published: (2008)
by: Dak, Ahmad Yusri, et al.
Published: (2008)
A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2015)
by: Mubarak, Mohd Faizal
Published: (2015)
Multilevel multiresonator chipless radio frequency identification tags with high encoding capacity
by: Ibrahim, Omar Jabbar
Published: (2016)
by: Ibrahim, Omar Jabbar
Published: (2016)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
Similar Items
-
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015) -
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021) -
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002) -
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002) -
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)