Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 5
Page No. 1115 - 1117

Finite Field Expansion Methods for the More Secure Information Protecting Code

Authors : Hyeong-KeonAn

References

Billinton, R. and E. Khan, 1992. A security based approach to composite power system reliability evaluation. IEEE. Trans. Power Syst., 7: 65-72.
CrossRef  |  Direct Link  |  

Cormen, T.H., C.E. Leiserson, R.L. Rivest and C. Stein, 2001. Introduction to Algorithms. 2nd Edn., The MIT Press, Cambridge, UK., ISBN-13: 9780262032933, Pages: 1180.

Ferguson, N. and B. Schneier, 2003. Practical Cryptography. Wiley, Hoboken, New Jersey, USA., ISBN:9780471223573, Pages: 410.

Hyeong-Keon, A., 2013. Fast and low cost GF(28) multiplier design based on double subfield transformation. Intl. J. Software Eng. Appl., 7: 285-294.
Direct Link  |  

Katz, J. and Y. Lindell, 2007. Introduction to Modern Cryptography: Principles and Protocols. CRC Press, Boca Raton, Florida, ISBN:978-1-584-885-511 Pages: 529.

Keon, A.H., 2016. Security of wireless sensor network using the subfield transformed reed Solomon code. Intl. Inf. Inst. Tokyo Inf., 19: 1587-1592.
Direct Link  |  

Schneier, B., 1996. Applied Cryptography. 2nd Edn., John Wiley and Sons, Australia, ISBN: 0-471-11709-9.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved