Noncommutative analogue of Diffie-Hellman protocol in matrix ring over the residue ring
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 10
Abstract
Abstract. Classical Diffie-Hellman protocol of the key establishment was the basis of the development of several key exchange protocols. But this protocol is not secure and it is not protected against the “man in the middle†attack. The purpose of this article is to offer a secure and practical noncommutative analogue of the Diffie–Hellman protocol that is reliably protected not only against “man in the middle†attack but also against the quantum computer attack
Authors and Affiliations
Semen Konstantin Rososhek, Evgeniy Gorbunov
Factors influencing motivation level of academic staff in Education of IBA Community College Khairpur Mir's
To investigate the degree to which various factors influence motivation level of academic staff of IBA Community College Khairpur Mir's. The study has utilized a questionnaire survey. Participants were 40 (24 male, 16 fe...
TDMA Scheduling Algorithm Using Independent Sets in Network Graph
Wireless Sensor Networks (WSNs) is a distributed wireless network consists of large amount of sensor nodes which gather useful information from a variety of environment and these sensor nodes communicate with each other...
AN EFFICIENT MEMORY MANAGEMENT TECHNIQUE FOR SMART CARD OPERATING SYSTEM
This research paper examines memory managementissues associated with Smart card EEPROM and proposes a newtechnique for memory management for smart card files. Theentire work concentrates to suggest a new methodology onme...
Optimization of Constituents of (Ni, MO, Cu)/Kieselguhr Catalyst by Response Surface Methodology for Glycerol Production by Hydrogenolysis of Sucrose
Sucrose hydrogenolysis is industrially important forthe production of polyols. To provide high glycerol yieldunder milder reaction conditions, a nickel catalyst promotedby Molybdenum and copper supported on kieselguhr wa...
RFID Based Efficient Wireless Monitoring System
Nowadays, surveillance has become a need in any private or public area due to the increase in the number of threats such as robberies, terrorists, and abusers. In this paper, an efficient wireless monitoring system using...