An empirical study on pseudoprime generation
In this day and age, security is regarded of high importance when dealing with confidential information. Cryptography is a growing field that provides many benefits to the technological society such as data integrity, digital signature, authentication and identification. Public key cryptosystems are...
Saved in:
Main Author: | Moghareh, Emilio Ramin Y. |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2008
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etd_masteral/3477 https://animorepository.dlsu.edu.ph/context/etd_masteral/article/10315/viewcontent/CDTG004210_P.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Similar Items
Fibonacci numbers and finite continued fractions
by: Go, Aurea Marietta G., et al.
Published: (1997)
by: Go, Aurea Marietta G., et al.
Published: (1997)
Similar Items
-
Finding prime desert N-tuplets
by: Candoleta, Herbert H., et al.
Published: (1994) -
On wieferich primes and period lengths for the expansions of fractions
by: Vincent, Jake Ngo T., et al.
Published: (2009) -
On Wieferich primes and period lengths for the expansions of fractions
by: Vincent, Jake T. Ngo, et al.
Published: (2009) -
On LB numbers (with a computer program)
by: Cruz, McNeil A., et al.
Published: (1996) -
Beneath the literal encrypting the decrypted, decrypting the encrypted
by: Dykimching, Reagan W., et al.
Published: (2008)