New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
Public-key cryptosystems are broadly used in security protocols such as key agreement, authentication, encryption and others. The two main operations in many public-key algorithms are multiplication and exponentiation of large numbers. The performance and efficiency of these cryptographic primitives...
| Main Author: | Eghdamian, Arash |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/55545/ |
| Abstract | Abstract here |
Similar Items
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009)
by: Jahani , Shahram
Published: (2009)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
Industrial Machine Allocation Using Rulebased Knowledge Representation Technique.
by: Wan Rameli, Wan Nur Akmal
Published: (2010)
by: Wan Rameli, Wan Nur Akmal
Published: (2010)
Automatic B-Spline Parameterisation And Scaling Estimation For Rigid Super-Curves Based Skull Registration.
by: Tan, Joi San
Published: (2010)
by: Tan, Joi San
Published: (2010)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
Segmentation Assisted Object Distinction For Direct
Volume Rendering
by: Irani, Arash Azim Zadeh
Published: (2013)
by: Irani, Arash Azim Zadeh
Published: (2013)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
by: Jantan, Azrul Hazri
Published: (2009)
by: Jantan, Azrul Hazri
Published: (2009)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
New Fuzzy Parametric Linear Programming Approaches For Optimising The Performance Of Crude Oil Companies In Iraq
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
Division-Based Methods For Large Point Sets Registration
by: Chen , Junfen
Published: (2016)
by: Chen , Junfen
Published: (2016)
Optimized feature construction methods for data summarizations of relational data
by: Sze, Florence Sia Fui
Published: (2014)
by: Sze, Florence Sia Fui
Published: (2014)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Steady Heat Conduction Solution Using Trigonometric Bezier Finite Element Method
by: Abidin, Mohamad Naufal Zainal
Published: (2024)
by: Abidin, Mohamad Naufal Zainal
Published: (2024)
Common Radio Resource Management: Joint Call Admission Control And Traffic Offloading Method
by: Zaini, Khuzairi Mohd
Published: (2018)
by: Zaini, Khuzairi Mohd
Published: (2018)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
Document And Query Expansion Method
With Dirichlet Smoothing Model For
Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
Document And Query Expansion Method With Dirichlet Smoothing Model For Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
A Study On Determinants Of Rfid Adoption Intention Among Hajj Organizers In Indonesia And Malaysia And Its Strategic Information Systems Plan
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
Modified And Ensemble Intelligent
Water Drop Algorithms And Their
Applications
by: O. F. Alijla, Basem
Published: (2015)
by: O. F. Alijla, Basem
Published: (2015)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024)
by: Abba, Abubakar
Published: (2024)
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
by: Shamsuddin, Nurul Afiqah
Published: (2014)
by: Shamsuddin, Nurul Afiqah
Published: (2014)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
by: Hing, Ratana
Published: (2024)
by: Hing, Ratana
Published: (2024)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Prediction Of User Behavior Intention Towards Robo-Advisor Applications In Fintech Using The Utaut Model
by: Cheong, Suk Fun
Published: (2023)
by: Cheong, Suk Fun
Published: (2023)
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015)
by: Wong, Kai Sin
Published: (2015)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Personalizable Models For Business-To-Business Information Interchange In Communication Layers
by: Ting, Tin Tin
Published: (2011)
by: Ting, Tin Tin
Published: (2011)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Similar Items
-
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016) -
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009) -
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020) -
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022) -
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009)
