On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory
Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia. As a novel trend in the world of cryptography, non-classical integer systems, such as neu...
Saved in:
Main Authors: | Mohammad Abobala, Hasan Sankari, Mohamed Zeina |
---|---|
Format: | Article |
Language: | English |
Published: |
Ayandegan Institute of Higher Education,
2024-03-01
|
Series: | Journal of Fuzzy Extension and Applications |
Subjects: | |
Online Access: | https://www.journal-fea.com/article_188610_01287a9dd768b182af73dae66faed762.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research status and prospect of grain refinement in aluminum alloy
by: Xinyue Zhang, et al.
Published: (2025-01-01) -
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
by: Aleksėjus Michalkovič, et al.
Published: (2023-11-01) -
On degenerated cyclic codes
by: Gintaras Skersys
Published: (2005-12-01) -
IAR 2.0: An Algorithm for Refining Inconsistent Annotations for Time-Series Data Using Discriminative Classifiers
by: Einari Vaaras, et al.
Published: (2025-01-01) -
WAYS OF INCREASING THE FINANCIAL STABILITY OF OIL REFINING INDUSTRY IN MODERN CONDITIONS
by: V. Ashikhin
Published: (2017-05-01)