Local cover image
Local cover image
Image from OpenLibrary

New DES based on EC / Ghada Abdelmouez M. Abdelhady ; Supervised Ashraf Mansour , Fathy Saad Helail , Wafik B. Lotfallah

By: Contributor(s): Material type: TextLanguage: English Publication details: Cairo : Ghada Abdelmouez Mohamed Abdelhady , 2011Description: 144 Leaves : charts ; 30cmOther title:
  • نظام مستحدث للتشفير مؤسس على المنحنيات الأهليلجية [Added title page title]
Online resources: Dissertation note: Thesis (Ph.D.) - German University - Faculty of Postgraduate Studies and Scientific Research - Department of Media Engineering and Technology Summary: Elliptic curves (EC) have proved to be a good choice for building asymmetric encryption system. Also EC has been used to enhance the asymmetric systems to minimize the secret key such as RSA, Diffie-Hellman and Elgamal systems. Although most of the symmetric systems have been broken, we can use EC to create a new system that has the same properties of the symmetric encryption systems and at the same time, it has the strength of elliptic curves in encryption
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Call number Status Barcode
Thesis قاعة الثقاقات الاجنبية - الدور الثالث المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.34.Ph.D.2011.Gh.N (Browse shelf(Opens below)) Not for loan 01010110060170000

Thesis (Ph.D.) - German University - Faculty of Postgraduate Studies and Scientific Research - Department of Media Engineering and Technology

Elliptic curves (EC) have proved to be a good choice for building asymmetric encryption system. Also EC has been used to enhance the asymmetric systems to minimize the secret key such as RSA, Diffie-Hellman and Elgamal systems. Although most of the symmetric systems have been broken, we can use EC to create a new system that has the same properties of the symmetric encryption systems and at the same time, it has the strength of elliptic curves in encryption

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Share
Cairo University Libraries Portal Implemented & Customized by: Eng. M. Mohamady Contacts: new-lib@cl.cu.edu.eg | cnul@cl.cu.edu.eg
CUCL logo CNUL logo
© All rights reserved — Cairo University Libraries
CUCL logo
Implemented & Customized by: Eng. M. Mohamady Contact: new-lib@cl.cu.edu.eg © All rights reserved — New Central Library
CNUL logo
Implemented & Customized by: Eng. M. Mohamady Contact: cnul@cl.cu.edu.eg © All rights reserved — Cairo National University Library