Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 5 SI
Page No. 4774 - 4777

Decrees the Possibility of Predicting Initialization Vector by Using Mathematical Methods

Authors : Mohammad Jawad Kadhim Abood, Faez Al-Maamori and Wadhah R. Baiee

References

Al-Maamori, F. and T. Hilberdink, 2015. An example in Beurling's theory of generalised primes. Acta Arithmetica, 168: 383-395.
CrossRef  |  Direct Link  |  

Al-Maamori, F., A. Hadi and A. Al-Salih, 2016. Building the primes P and Q (of the public key algorithm) by using function of reals. Res. J. Appl. Sci., 11: 1050-1053.
CrossRef  |  

Al-Maamori, F.A., 2017. Examples of beurling prime systems. Math. Slovaca, 67: 321-344.
Direct Link  |  

Apostol, T.M., 1974. Mathematical Analysis. 2nd Edn., Addison-Wesley, Boston, Massachusetts, ISBN:9780201002881, Pages: 492.

Apostol, T.M., 1976. Introduction to Analytic Number Theory. 1st Edn., Springer, New York, ISBN: 9781475755794, Pages: 340.

Kent, S. and R. Atkinson, 1998. IP Encapsulating Security Payload (ESP). Internet RFC., 1: 1-22.
Direct Link  |  

McCubbin, C.B., A.A. Selcuk and D. Sidhu, 2000. Initialization vector attacks on the IPsec protocol suite. Proeedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE’2000), June 14-16, 2000, IEEE, Gaithersburg, Maryland, USA., pp: 171-175.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved