RADG Design on Elliptic Curve Cryptography
Global Proceedings Repository
View Archive InfoField | Value | |
Title |
RADG Design on Elliptic Curve Cryptography
|
|
Creator |
Salah A. Albermany Salah A. Albermany
Ali Hasan Alwan |
|
Description |
The main problem in Reaction Automata Direct Graph (RADG) is the static design the purpose of this paper is to develops RADG algorithm to become more efficient by enhancing characteristics to cover large networks, use of the key in the encryption process increase the complexity against the attacker on networks and improved the single Reaction states in RADG to Multi-Reaction states which is up the speed of the algorithm finally the internal design become changeable which it was static in RADG so the RADG with our enhancement become Multi- Reaction Automata Direct Graph (MRADG), The output of the algorithm in our study result is changed from binary to points in (EC).
|
|
Publisher |
Int'l Conference on Change, Innovation, Informatics and Disrurptuive Technology
|
|
Contributor |
—
|
|
Date |
2016-12-23 17:21:36
|
|
Type |
Peer-reviewed Paper
|
|
Format |
application/pdf
|
|
Identifier |
http://proceedings.sriweb.org/repository/index.php/ICCIIDT/icciidtt_london/paper/view/41
|
|
Source |
Int'l Conference on Change, Innovation, Informatics and Disrurptuive Technology; ICCIIDT London - UK
|
|
Language |
en
|
|
Rights |
Authors who submit to this conference agree to the following terms: a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference. b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference. c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference. |
|