Implementation of Blom's key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom's Key pre-distribution uses an integer finite field which makes this scheme easy to be inte...
Saved in:
Main Authors: | Udin, Md Nizam (Author), Mohd Amin, Farah Azaliney (Author), Abdul Malek, Aminah (Author), Zulkifili, Nur Annisa (Author), Ghazali, Nur Atiqah (Author), Mohd Ridzuwan, Siti Aisyah (Author) |
---|---|
Format: | Book |
Published: |
Penerbit UiTM,
2021-10.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Application of Lamport Digital Signature Scheme into the station-to-station protocol / Md Nizam Udin ... [et al.]
by: Udin, Md Nizam, et al.
Published: (2022) -
PENGGABUNGAN MODIFIKASI HILL CIPHER DAN ELLIPTIC CURVE CRYPTOGRAPHY UNTUK MENINGKATKAN KEAMANAN PESAN
by: Hana Nur Azizah, -
Published: (2019) -
KRIPTOGRAFI VISUAL PADA GAMBAR BERWARNA (RGB) MENGGUNAKAN ALGORITMA ELLIPTIC CURVE CRYPTOGRAPHY
by: Della Annisa Zahra, -
Published: (2020) -
IMPLEMENTASI KRIPTOGRAFI ELLIPTIC CURVE CRYPTOGRAPHY(ECC) DAN STEGANOGRAFI SPREAD SPECTRUM PADAPENGAMANAN PESAN KE DALAM GAMBAR
by: Muhammad Daud, -
Published: (2023) -
Warisan tiada kesinambungan: labu sayong picit cubit / Nur Adilah Khaliqah Khusairi, Nur Aisyah Abd Razak and Mohd Nizam Yunus
by: Khusairi, Nur Adilah Khaliqah, et al.
Published: (2021)