Skip to content
VuFind
Advanced
  • Enhance key generation algorit...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Enhance key generation algorithm based user string identity as public key

Enhance key generation algorithm based user string identity as public key

This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a publ...

Full description

Bibliographic Details
Main Author: Norhidayah, Muhammad
Format: Thesis
Language:English
English
English
Published: 2015
Subjects:
Q Science (General)
QA Mathematics
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/13065/
http://umpir.ump.edu.my/id/eprint/13065/
http://umpir.ump.edu.my/id/eprint/13065/1/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623.pdf
http://umpir.ump.edu.my/id/eprint/13065/2/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%201.pdf
http://umpir.ump.edu.my/id/eprint/13065/3/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%203.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/13065/
http://umpir.ump.edu.my/id/eprint/13065/
http://umpir.ump.edu.my/id/eprint/13065/1/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623.pdf
http://umpir.ump.edu.my/id/eprint/13065/2/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%201.pdf
http://umpir.ump.edu.my/id/eprint/13065/3/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%203.pdf

Similar Items

  • Enhancement of RSA Key Generation Using Identity
    by: Norhidayah, Muhammad, et al.
    Published: (2015)
  • Loop-based RSA Key Generation Algorithm using String Identity
    by: Norhidayah, Muhammad, et al.
    Published: (2013)
  • Public key cryptography in resource-constrained WSN
    by: Pathan, Al-Sakib Khan, et al.
    Published: (2008)
  • An efficient public key based security architecture for wireless sensor networks
    by: Haque, Md. Mokammel, et al.
    Published: (2007)
  • Strings
    by: Bhatti, Zeeshan, et al.
    Published: (2011)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips
Cannot write session to /tmp/vufind_sessions/sess_vdvug2kf7r2h8ssqcstcq8mnpv