Search Results - (( data interpolating rsa algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- data interpolating »
- stemming algorithm »
- interpolating rsa »
- java application »
- rsa algorithm »
-
1
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis
