Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Arif Mandangan"'
Autor:
Olayiwola Babarinsa, Olalekan Ihinkalu, Veronica Cyril-Okeme, Hailiza Kamarulhaili, Arif Mandangan, Azfi Zaidi Mohammad Sofi, Akeem B. Disu
Publikováno v:
Journal of Nigerian Society of Physical Sciences, Vol 4, Iss 4 (2022)
Goldreich-Goldwasser-Halevi (GGH) encryption scheme is lattice-based cryptography with its security based on the shortest vector problem (SVP) and closest vector problem (CVP) with immunity to almost all attacks, including Shor's quantum algorithm an
Externí odkaz:
https://doaj.org/article/068a687c61674db5836529b9ca1b2e88
Publikováno v:
Mathematics, Vol 9, Iss 18, p 2226 (2021)
Matrix inversion is one of the most significant operations on a matrix. For any non-singular matrix A∈Zn×n, the inverse of this matrix may contain countless numbers of non-integer entries. These entries could be endless floating-point numbers. Sto
Externí odkaz:
https://doaj.org/article/fc2353bc31244a5fa6425b8ef638eb0e
Publikováno v:
Journal of Advanced Research in Fluid Mechanics and Thermal Sciences. 99:197-206
The Multistep Modified Reduced Differential Transform Method (MMRDTM) is proposed in this paper. It is implemented to solve the forced nonlinear Korteweg-de Vries (fnKdV) equations. There are several advantages of the proposed method. Using the sugge
Publikováno v:
Sains Malaysiana. 49:1471-1478
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred to as GGH cryptosystem, is considered broken. The GGH cryptosystem was initially addressed as the first practical lattice-based cryptosystem. Once
Publikováno v:
Mathematics, Vol 9, Iss 2226, p 2226 (2021)
Mathematics
Volume 9
Issue 18
Mathematics
Volume 9
Issue 18
Matrix inversion is one of the most significant operations on a matrix. For any non-singular matrix A∈Zn×n, the inverse of this matrix may contain countless numbers of non-integer entries. These entries could be endless floating-point numbers. Sto
Autor:
Arif Mandangan, Che Haziqah Che Hussin
We used the Differential Transformation Method to solve linear and nonlinear eighth-order boundary value problems in this study. The error of DTM is then calculated, and the results are compared to those of other methods such as the modified implemen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a123dd549dac5cdf63866d254e9d6d1d
https://doi.org/10.9734/bpi/aaer/v15/8535d
https://doi.org/10.9734/bpi/aaer/v15/8535d
Publikováno v:
Journal of Physics: Conference Series. 1366:012016
A lattice basis is consisting of linearly independent basis vectors that span the lattice. A lattice in dimension of 2 and above have infinitely many bases. These bases have different quality in terms of the length (norm) and orthogonality of basis v
Publikováno v:
AIP Conference Proceedings.
We may secure the content of text, audio, image and video during their transmission from one party to another party via an open channel such as the internet by using cryptograph. Logistic-Sine System (LSS) is a combination on two 1D chaotic maps whic
Publikováno v:
Jurnal Teknologi. 78
One of the four security goals is authentication. Authentication is a mechanism to ensure that we are communicating with the intended party. If Alice and Bob want to communicate securely, then the authentication mechanism will be able to ensure that
Publikováno v:
Jurnal Teknologi. 78
In this study, sixth-order boundary value problems for linear and nonlinear differential equations have been solved by using Differential Transformation Method (DTM). The numerical solutions are given in several examples. For each example, the soluti