Number Theory and Cryptography: An Analytical Approach
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 6
Abstract
The more I have considered Computer Science, the more I see that it is truly a type of connected Mathematics. The two are regularly combined in University divisions, and numerous understudies study both for a more profound comprehension of the key procedures of PCs. As innovation advances, the abilities of PCs increment significantly. Basically, these capacities are simply numerical capacities that run speedier and control more information. To better my comprehension of PC innovation, I contemplated the science behind two long time (and everlastingly) executed PC forms: Cryptography and security.
Authors and Affiliations
P. N. V . Prasada Rao| Senior Lecturer in Mathematics Sir C. R. R. Autonomous College, Eluru, Andhra Pradesh, India Prasad.potturi999@gmail.com, B. Srinivasa Rao| Senior Lecturer in Mathematics Sir C. R. R. Autonomous College, Eluru, Andhra Pradesh, India, srinivasrao.banda@gmail.com
Thermal Analysis of Exhaust Manifold Coating with High Temperature Resistant Materials
In IC engines exhaust system plays an important role in delivering the waste gases to a safe distance and also it helps in reducing the sound pollution and air pollution ,these exhaust systems ,mainly exhaust manifol...
An Effective Utilization of Concentrated Solar Energy
This thesis describes a new Concentrating Solar Energy with Integral thermal storage that is applied in a solar thermal power station. Solar radiation is concentrated on the boiler of a conventional power station by t...
A Grid Connected Wind Energy System’s Power Quality Improvement By Using D-Statcom
Now a day’s one of the Main issue is Power Quality. The modern device performance is very sensitive with the power supply quality and makes it’s an important aspect. Power Quality problem occurs when the voltage,...
Design and Implementation of home security system with feedback and control of electric gadgetry
An embedded system is designed for providing security to home, as the home security is the more prior among all other aspects which are among to home. The system has two sections, one is main station and other is fee...
Detection of Masquerade Attacks using Data-Driven Semi-Global Alignment Approach
The broad utilization of virtualization in representing security basis conveys unrivaled security worries for inhabitants or clients and presents an extra layer that itself must be totally arranged and secured. Gatec...