Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Md Nizam Udin"'
Autor:
Md Nizam Udin, Farah Azaliney Mohd Amin, Nor Ainaa Mat Abu, Siti Nurfazliana Mohamad Sarif, Intan Nur Athirah Binti Mohammad Zuki
Publikováno v:
Malaysian Journal of Computing, Vol 7, Iss 2, Pp 1139-1149 (2022)
In cryptography, the key exchange protocol is very important before starting secure communication. Both parties will use an asymmetric key algorithm to exchange their keys for encryption and decryption. One of the methods to securely exchange the key
Externí odkaz:
https://doaj.org/article/8de973b8c18342f99c811b3d9f484d32
Autor:
Md Nizam Udin, Farah Azaliney Mohd Amin, Aminah Abdul Malek, Nur Annisa Zulkifili, Nur Atiqah Ghazali, Siti Aisyah Mohd Ridzuwan
Publikováno v:
Malaysian Journal of Computing, Vol 6, Iss 2, Pp 812-822 (2021)
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finit
Externí odkaz:
https://doaj.org/article/cca26b18d7af4a98a367df13abc5c281