The Construction Of Quantum Block Cipher For Grover Algorithm
Asymmetric and symmetric cryptography are believed to be secure against any attack using classical computers. However, this view is no longer valid in the presence of quantum computing. Asymmetric cryptographic algorithms which are based on integer factorization or discrete logarithms problems are...
| Main Author: | Eid, Almazrooie Mishal |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/43602/ http://eprints.usm.my/43602/1/ALMAZROOIE%20MISHAL%20EID.pdf |
Similar Items
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
Image Encrytion Using Block Based Transformation Algorithm
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
A HYBRID GENETIC ALGORITHM FOR OPTICAL ORTHOGONAL CODE CONSTRUCTION
by: Ho, C. K., et al.
Published: (2003)
by: Ho, C. K., et al.
Published: (2003)
Gpu Based Fast Phylogenetic Tree
Construction Algorithm With Reduce
Dataset
by: Ibrahim, Najihah
Published: (2016)
by: Ibrahim, Najihah
Published: (2016)
Associative Memory Based Image and Object Recognition by Quantum Holography
by: Loo, Chu Kiong, et al.
Published: (2004)
by: Loo, Chu Kiong, et al.
Published: (2004)
Patient video compression using 3-D block transforms for telemedicine applications
by: Sriraam, N, et al.
Published: (2006)
by: Sriraam, N, et al.
Published: (2006)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Pair Bonds In Genetic Algorithm
by: Lim , Ting Yee
Published: (2015)
by: Lim , Ting Yee
Published: (2015)
CPT212 – Design & Analysis of Algorithms
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
A Social Based Model For Genetic Algorithms.
by: AL-Madi, Nagham Azmi, et al.
Published: (2007)
by: AL-Madi, Nagham Azmi, et al.
Published: (2007)
Adapting Artificial Immune Algorithms For University Timetabling
by: Malim , Muhammad Rozi
Published: (2009)
by: Malim , Muhammad Rozi
Published: (2009)
Protein Conformantional Search Using Bees Algorithm
by: Bahamish, Hesham Awadh A., et al.
Published: (2008)
by: Bahamish, Hesham Awadh A., et al.
Published: (2008)
CCS592 – Advanced Algorithms and Complexity June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CPT212 – Design & Analysis of Algorithms June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
An efficient algorithm for fast computation of pseudo-Zernike moments
by: Chong, Chee-Way
Published: (2003)
by: Chong, Chee-Way
Published: (2003)
Context Aware Handover Algorithms For Mobile Positioning Systems
by: Zaman Khan, Sazid, et al.
Published: (2014)
by: Zaman Khan, Sazid, et al.
Published: (2014)
CPT 201- DESIGN & ANALYSIS OF ALGORITHMS OKT 04
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
Swarm Intelligence Based Protein Conformational Search Algorithm.
by: Bahamish, Hesham Awadh Abdallah, et al.
Published: (2007)
by: Bahamish, Hesham Awadh Abdallah, et al.
Published: (2007)
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007)
by: Jaber, Khalid, et al.
Published: (2007)
CPT 201 - DESIGN AND ANALYSIS OF ALGORITHMS - OKT. 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
Modified And Ensemble Intelligent
Water Drop Algorithms And Their
Applications
by: O. F. Alijla, Basem
Published: (2015)
by: O. F. Alijla, Basem
Published: (2015)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
CCS592 – Advanced Algorithms & Complexity June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
CPT212 - Design & Analysis of Algorithms June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
An Enhanced Flower Pollination Algorithm For Multiple Sequence Alignment
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
A comparative analysis of algorithms for fast computation of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
by: Kee, Sim Ee, et al.
Published: (2007)
by: Kee, Sim Ee, et al.
Published: (2007)
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014)
by: Jahani, Shahram, et al.
Published: (2014)
Comparison Of HSRNAFold and RNAFold Algorithms for RNA Secondary Structure Prediction.
by: M. Mohsen, Abdulqader, et al.
Published: (2009)
by: M. Mohsen, Abdulqader, et al.
Published: (2009)
CCS524 – PARALLEL COMPUTING ARCHITECTURES AND ALGORITHMS NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
Similar Items
-
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005) -
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021) -
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017) -
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017) -
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)