Beneath the literal encrypting the decrypted, decrypting the encrypted
This paper mainly discusses Cryptography, a well-known application of number theory. Although it touches on some examples of conventional cryptosystem, the main focus of this paper is all about the second kind of cryptosystem, the private-key cryptosystems. The researchers studied the Mathematics be...
Saved in:
Main Authors: | Dykimching, Reagan W., San Pedro, Lorraine Anne T. |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2008
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/5053 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Similar Items
-
Memory encryption-decryption in embedded systems
by: Tan, Xuan Yi
Published: (2019) -
Data and speech encryption and decryption system
by: Tan, Han Ngee.
Published: (2011) -
Attribute-based encryption with verifiable outsourced decryption
by: LAI, Junzuo, et al.
Published: (2013) -
High-speed memory encryption and decryption in embedded system
by: Tan, Yng Tzer
Published: (2017) -
High-speed memory encryption-decryption in embedded systems
by: Lim, Qi Wei
Published: (2016)