Found: 31 resources
A critical review of mechanisms of Protocols Using Shared Key Cryptography based on BGJKMY Protocols
Iraqi Journal of Humanitarian, Social and Scientific Research, 2023, Volume 3, Issue 10A, Pages 165-173
Impact of decreasing polynomial degree in time needed to factor a 100 digits integer by General Number field sieve algorithm
Engineering and Technology Journal, 2012, Volume 30, Issue 4, Pages 577-590
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
Baghdad Science Journal, 2011, Volume 8, Issue 2, Pages 408-418
ON USING THE SYMMETRIC GROUP IN A CRYPTOSYSTEM
Iraqi Journal of Science, 2012, Volume 53, Issue 1, Pages 186-193
Performance Evaluation of Encrypted Data Inquiries using Chained Perfect Hashing (CPH)
Journal of Baghdad College of Economic sciences University, 2013, Volume 2013, Issue 4, Pages 511-520
Key Exchange Management by using Neural Network Synchronization
Journal of the College of Education for Women, 2013, Volume 24, Issue 1, Pages 290-302
Hybrid Public- Key Cryptosystem
Journal Of AL-Turath University College, 2014, Volume , Issue 16, Pages 1-9
Proposal of New Block Cipher Algorithm Depend on Public Key Algorithms
AL-MANSOUR JOURNAL, 2016, Volume , Issue 26, Pages 119-140
Design of Public Key Cryptosystem Based on Isomorphism abelain group (IAG)
journal of the college of basic education, 2012, Volume 18, Issue 73 / ملحق, Pages 73-80
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
Baghdad Science Journal, 2021, Volume 18, Issue 2, Pages 338-348