期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
On the Group Based Cryptography
1
作者 Mehmet KALKAN hacl aktas 《Journal of Mathematics and System Science》 2014年第11期710-714,共5页
There are quite more applications of group theory. The recent application of group theory is public key (asymmetric) cryptography. All cryptographic algorithms have some weaknesses. To avoid its weakness, some speci... There are quite more applications of group theory. The recent application of group theory is public key (asymmetric) cryptography. All cryptographic algorithms have some weaknesses. To avoid its weakness, some special groups and methods can applied on. We will touch on group based public key cryptography and will give some suggestions in this area. 展开更多
关键词 Soft Groups Soft Cryptography Public Key Cryptography
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部