Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Cryptographical Applications of Linear Transformations and Pell Equations: An R-Based Approach
Kaleeswari, K, Kannan, J, Deepshika, A, Mahalakshmi, M
Published in Indian journal of science and technology (28.12.2024)
Published in Indian journal of science and technology (28.12.2024)
Get full text
Journal Article
Options for using the Maple computer algebra system in cryptology training
Olenev, A. A., Kirichek, K. A., Potekhina, E. V., Grivennaya, , N. V., Pelikh, O. V.
Published in AIP conference proceedings (01.11.2022)
Published in AIP conference proceedings (01.11.2022)
Get full text
Journal Article
Conference Proceeding
MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM
Havrylova, Alla, Korol, Olha, Milevskyi, Stanyslav
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2019)
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2019)
Get full text
Journal Article
Fast RSA-type cryptosystem with public data of small size
Satake, Kenji, Kasahara, Masao
Published in Electronics & communications in Japan. Part 3, Fundamental electronic science (01.02.1997)
Published in Electronics & communications in Japan. Part 3, Fundamental electronic science (01.02.1997)
Get full text
Journal Article
RSA ve RC4 algoritmalarının performans karşılaştırması
Yüksel,Tuğçe, Özgün,Büşra
Published in Aurum Mühendislik Sistemleri ve Mimarlık Dergisi (A-JESA) (2021)
Get full text
Published in Aurum Mühendislik Sistemleri ve Mimarlık Dergisi (A-JESA) (2021)
Journal Article
Cryptographic Algorithm Based on Prime Assignment
Mahalakshmi, M.
Published in International journal for research in applied science and engineering technology (31.01.2022)
Published in International journal for research in applied science and engineering technology (31.01.2022)
Get full text
Journal Article