Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]

Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervene...

Full description

Saved in:
Bibliographic Details
Main Authors: Udin, Md Nizam, Mohd Amin, Farah Azaliney, Abdul Malek, Aminah, Zulkifili, Nur Annisa, Ghazali, Nur Atiqah, Mohd Ridzuwan, Siti Aisyah
Format: Article
Language:English
Published: Penerbit UiTM 2021
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/49132/1/49132.pdf
https://ir.uitm.edu.my/id/eprint/49132/
https://mjoc.uitm.edu.my/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Mara
Language: English
Be the first to leave a comment!
You must be logged in first