New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
Public-key cryptosystems are broadly used in security protocols such as key agreement, authentication, encryption and others. The two main operations in many public-key algorithms are multiplication and exponentiation of large numbers. The performance and efficiency of these cryptographic primitives...
| Auteur principal: | Eghdamian, Arash |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2020
|
| Sujets: | |
| Accès en ligne: | http://eprints.usm.my/55545/ |
| Abstract | Abstract here |
Documents similaires
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
par: Jahani, Shahram
Publié: (2016)
par: Jahani, Shahram
Publié: (2016)
Zot-mk: A New Algorithm For Big Integer Multiplication
par: Jahani , Shahram
Publié: (2009)
par: Jahani , Shahram
Publié: (2009)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
par: Jahani, Shahram
Publié: (2009)
par: Jahani, Shahram
Publié: (2009)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
par: Alawida, Moatsum Khalif Oduh
Publié: (2020)
par: Alawida, Moatsum Khalif Oduh
Publié: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
par: Alawida, Moatsum Khalif Oduh
Publié: (2022)
par: Alawida, Moatsum Khalif Oduh
Publié: (2022)
Industrial Machine Allocation Using Rulebased Knowledge Representation Technique.
par: Wan Rameli, Wan Nur Akmal
Publié: (2010)
par: Wan Rameli, Wan Nur Akmal
Publié: (2010)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
par: Elejla, Omar E. O.
Publié: (2018)
par: Elejla, Omar E. O.
Publié: (2018)
Automatic B-Spline Parameterisation And Scaling Estimation For Rigid Super-Curves Based Skull Registration.
par: Tan, Joi San
Publié: (2010)
par: Tan, Joi San
Publié: (2010)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
par: Othman, Fazilah
Publié: (2010)
par: Othman, Fazilah
Publié: (2010)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
par: Mohammad A. Suwais, Khaled
Publié: (2009)
par: Mohammad A. Suwais, Khaled
Publié: (2009)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
par: Alkhafaji, Ali Fawzi Mohammed Ali
Publié: (2024)
par: Alkhafaji, Ali Fawzi Mohammed Ali
Publié: (2024)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
par: A. Alia, Mohammad Ahmad
Publié: (2008)
par: A. Alia, Mohammad Ahmad
Publié: (2008)
A new approach based on honeybee guarding system to improve intrusion detection system.
par: Ahmed Ali, Ghassan
Publié: (2011)
par: Ahmed Ali, Ghassan
Publié: (2011)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
par: Ahmed Ali, Ghassan
Publié: (2011)
par: Ahmed Ali, Ghassan
Publié: (2011)
Segmentation Assisted Object Distinction For Direct
Volume Rendering
par: Irani, Arash Azim Zadeh
Publié: (2013)
par: Irani, Arash Azim Zadeh
Publié: (2013)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
par: Jaafar, Abdullah Mohammed Abdo Ali
Publié: (2011)
par: Jaafar, Abdullah Mohammed Abdo Ali
Publié: (2011)
New Fuzzy Parametric Linear Programming Approaches For Optimising The Performance Of Crude Oil Companies In Iraq
par: Jasim, Al Saeedi Rafid Abdulmahdi
Publié: (2023)
par: Jasim, Al Saeedi Rafid Abdulmahdi
Publié: (2023)
Division-Based Methods For Large Point Sets Registration
par: Chen , Junfen
Publié: (2016)
par: Chen , Junfen
Publié: (2016)
Optimized feature construction methods for data summarizations of relational data
par: Sze, Florence Sia Fui
Publié: (2014)
par: Sze, Florence Sia Fui
Publié: (2014)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
par: Al-Khatib, Ra’ed Mohammad Ali
Publié: (2011)
par: Al-Khatib, Ra’ed Mohammad Ali
Publié: (2011)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
par: Jothi, Neesha
Publié: (2020)
par: Jothi, Neesha
Publié: (2020)
Steady Heat Conduction Solution Using Trigonometric Bezier Finite Element Method
par: Abidin, Mohamad Naufal Zainal
Publié: (2024)
par: Abidin, Mohamad Naufal Zainal
Publié: (2024)
Common Radio Resource Management: Joint Call Admission Control And Traffic Offloading Method
par: Zaini, Khuzairi Mohd
Publié: (2018)
par: Zaini, Khuzairi Mohd
Publié: (2018)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
par: Jantan, Azrul Hazri
Publié: (2009)
par: Jantan, Azrul Hazri
Publié: (2009)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
par: Wan Mansor, Wan Nor Arifin
Publié: (2023)
par: Wan Mansor, Wan Nor Arifin
Publié: (2023)
Document And Query Expansion Method
With Dirichlet Smoothing Model For
Retrieval Of Metadata Content In Digital
Resource Objects
par: Alma’aitah, Wafa’ Za’al Mohammad
Publié: (2020)
par: Alma’aitah, Wafa’ Za’al Mohammad
Publié: (2020)
Document And Query Expansion Method With Dirichlet Smoothing Model For Retrieval Of Metadata Content In Digital
Resource Objects
par: Alma’aitah, Wafa’ Za’al Mohammad
Publié: (2020)
par: Alma’aitah, Wafa’ Za’al Mohammad
Publié: (2020)
A Study On Determinants Of Rfid Adoption Intention Among Hajj Organizers In Indonesia And Malaysia And Its Strategic Information Systems Plan
par: Al-Hashedi, Abdullah Hussein Ahmed
Publié: (2013)
par: Al-Hashedi, Abdullah Hussein Ahmed
Publié: (2013)
Static Hand Gesture Recognition Using Haar-Like Features
par: Wong, Kai Sin
Publié: (2015)
par: Wong, Kai Sin
Publié: (2015)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
par: Anbar, Mohammed F.R.
Publié: (2013)
par: Anbar, Mohammed F.R.
Publié: (2013)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
par: Abu-Alhaj, Mosleh Mohammad
Publié: (2011)
par: Abu-Alhaj, Mosleh Mohammad
Publié: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
par: Alzyoud, Faisal Yousef Abed-alrahman
Publié: (2011)
par: Alzyoud, Faisal Yousef Abed-alrahman
Publié: (2011)
Personalizable Models For Business-To-Business Information Interchange In Communication Layers
par: Ting, Tin Tin
Publié: (2011)
par: Ting, Tin Tin
Publié: (2011)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
par: Al-Saedi, Karim Hashim Kraidi
Publié: (2013)
par: Al-Saedi, Karim Hashim Kraidi
Publié: (2013)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
par: Wan Zainon, Wan Mohd Nazmee
Publié: (2011)
par: Wan Zainon, Wan Mohd Nazmee
Publié: (2011)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
par: SALLIM, JAMALUDIN
Publié: (2017)
par: SALLIM, JAMALUDIN
Publié: (2017)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
par: Mohammed, Imad Jasim
Publié: (2011)
par: Mohammed, Imad Jasim
Publié: (2011)
Harmony search-based fuzzy clustering algorithms for image segmentation.
par: Alia, Osama Moh’d Radi
Publié: (2011)
par: Alia, Osama Moh’d Radi
Publié: (2011)
Keyword Competition Approach In
Ranked Document Retrieval
par: Sihombing, Poltak
Publié: (2010)
par: Sihombing, Poltak
Publié: (2010)
Harmony search algorithms for ab initio protein tertiary structure prediction.
par: Rub, Mohammed Said Saleh Abual
Publié: (2011)
par: Rub, Mohammed Said Saleh Abual
Publié: (2011)
Documents similaires
-
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
par: Jahani, Shahram
Publié: (2016) -
Zot-mk: A New Algorithm For Big Integer Multiplication
par: Jahani , Shahram
Publié: (2009) -
ZOT-MK: a new algorithm for big integer multiplication[QA75].
par: Jahani, Shahram
Publié: (2009) -
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
par: Alawida, Moatsum Khalif Oduh
Publié: (2020) -
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
par: Alawida, Moatsum Khalif Oduh
Publié: (2022)
