Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 11
Page No. 3806 - 3812

Implementation Diffie-Hellman by Using Standard Groups and Hosoya-Polynomial to Generate a Matrix as Key Cryptosystem

Authors : Awni M. Gaftan, Akram S. Mohammed and Osama H. Subhi

References

Ali, A.M., 2005. Wiener polynomial of generalized distancein graph. MSc Thesis, University of Mosul, Mosul, Iraq.

Blom, R., 1983. Non-Public Key Distribution. In: Advances in Cryptology, Chaum, D. (Ed.). Plenum Press, New York, USA., ISBN:978-1-4757-0604-8, pp: 231-236.

Burton, D.M., 1967. Introduction to Modern Abstract Algebra. Addison-Wesley Publisher, ‎Boston, Massachusetts, Pages: 310.

Cherney, D., T. Denton and A. Walton, 2016. Linear Algebra. CreateSpace, Scotts Valley, California, USA., ISBN:9781530903863, Pages: 398.

Edwin, C., 2001. Elementary Abstract Algebra. University of South Florida, Tampa, Florida,.

Kandasamy, W.B.V. and F. Smarandache, 2009. Groups as Graphs. EdituraCuArt, Slatina, Romania, ISBN:9781599730936, Pages: 168.

Rock, A., 2005. Pseudorandom Number Generators for Cryptographic Applications. University Salzburg, Salzburg, Austria, Pages: 108.

Stinson, D.R., 1995. Cryptography: Theory and Practice. CRC Press, Boca Raton, Florida, USA., ISBN:9780849385216, Pages: 434.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved