Citation to this article as recorded by
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Rabah, K., 2006. Review of methods for integer factorization applied to cryptography. J. Applied Sci., 6: 458-481. CrossRefDirect Link |
Citation to this article as recorded by
A Robust and Hybrid Cryptosystem for Identity Authentication Information Vol. 12, Issue 3, 104, 2021 |
A Cryptographic Application of the M-Injectivity of 𝑀𝑛(𝑍𝑝) Over Itself International Journal of Recent Technology and Engineering (IJRTE) Vol. 10, Issue 4, 7, 2021 |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
Review of Methods for Integer Factorization Applied to Cryptography Journal of Applied Sciences Vol. 6, Issue 2, 458, 2006 |
How to cite this article
Kefa Rabah , 2005. Security of the Cryptographic Protocols Based on Discrete Logarithm Problem. Journal of Applied Sciences, 5: 1692-1712.
DOI: 10.3923/jas.2005.1692.1712
URL: https://scialert.net/abstract/?doi=jas.2005.1692.1712
DOI: 10.3923/jas.2005.1692.1712
URL: https://scialert.net/abstract/?doi=jas.2005.1692.1712