Finite and infinite field cryptography analysis and applications
Most of the currently used cryptosystems are defined over finite fields and use modular arithmetic. Their security is often based on the difficulty of solving certain number theoretic problems. In recent years, a large amount of work for introducing of systems defined on infinite field in the desig...
Saved in:
Main Authors: | Mohammed G. Al-Saidi, Nadia, Md. Said, Mohamad Rushdan, Mohammed, Arkan J. |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Online Access: | http://psasir.upm.edu.my/id/eprint/39922/1/39922.pdf http://psasir.upm.edu.my/id/eprint/39922/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018) -
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015) -
History, development and trend of Fractal based biometric cryptography
by: Labu, Md Ahadullah, et al.
Published: (2015) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)