Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Theoretical Physics and Cryptography

ISSN: 2322--3138
Publisher: University of Mohaghegh Ardabili


ADD TO MY LIST
 
Addition and doubling of points

Author(s): Dragan Vidakovic | Dusko Parezanovic | Jelena Kaljevic
Volume: 3
Issue: 1
Year: 2013
A Security Protocol for the Identification and Data Encrypt- Key Management of Secure Mobile Devices

Author(s): Chol-Un Kim | Dok-Jun An | Song Han
Volume: 3
Issue: 1
Year: 2013
Public key Steganography Using Discrete Cross-Coupled One-Dimensional Chaotic Maps

Author(s): Sodeif Ahadpour | Mahdiyeh Majidpour
Volume: 3
Issue: 1
Year: 2013
A Novel Algorithm to perform Cryptography Operations using Diffie-Hellman Approach and its Applications

Author(s): K. Ramkumar | K. Elangovan
Volume: 3
Issue: 1
Year: 2013
An Efficient Bilinear Pairing-Free Certificateless Two-Party Authenticated Key Agreement Protocol in the eCK model

Author(s): Yong-Jin Kim | Yong-Min Kim | Yong-Jin Choe | Hyong-Chol O
Volume: 3
Issue: 1
Year: 2013
Codes Detecting and Locating Periodic Errors PDF available

Author(s): P. K. Das | Vinod Tyagi
Volume: 2
Issue: 1
Year: 2013
Preparing for a (RSA) Digital Signature PDF available

Author(s): Dragan Vidakovic | Jelena Kaljevic | Dusko Parezanovic
Volume: 2
Issue: 1
Year: 2013
Public key Steganography Using Discrete Cross-Coupled Chaotic Maps PDF available

Author(s): Sodeif Ahadpour | Mahdiyeh Majidpour
Volume: 2
Issue: 1
Year: 2013
A Special Integer Sequence Strongly Connected to the Discrete Logarithm Problem PDF available

Author(s): Omar Khadir | Laszlo Szalay
Volume: 2
Issue: 1
Year: 2013
Localization of Hard Exudates in Retinal Fundus Image by Mathematical Morphology Operations PDF available

Author(s): Mehdi Ghafourian Fakhar Eadgahi | Hamidreza Pourreza
Volume: 1
Issue: 1
Year: 2012
Quasi-Linear Time Fully Homomorphic Public Key Encryption Algorithm (ZK111) PDF available

Author(s): Zaryab Khan
Volume: 1
Issue: 1
Year: 2012
Review on fifteen Statistical Tests proposed by NIST PDF available

Author(s): J K M Sadique Uz Zaman | Ranjan Ghosh
Volume: 1
Issue: 1
Year: 2012
A Pseudorandom Bit Generator based on Chaotic Coupled Map Lattices PDF available

Author(s): Sodeif Ahadpour | Yaser Sadra
Volume: 1
Issue: 1
Year: 2012
Deterministic and Probabilistic Approach in Primality Checking for RSA Algorithm PDF available

Author(s): Kumarjit Banerjee | Satyendra Nath Mandal | Sanjoy Das
Volume: 2
Issue: 1
Year: 2013
Upper Bound of Code-word Number of Some Separating Codes PDF available

Author(s): Ryul Kim | Myong-son Sihn | Ok-hyon Song
Volume: 2
Issue: 1
Year: 2013
Determination of Characteristic Relaxation Times and Their Significance in A Copper Oxide Thin Film

Author(s): Moses E Emetere | Muhammad M Bakeko
Volume: 4
Year: 2013
Comparative Study of AODV and DSR Routing Protocols for MANET: Performance Analysis

Author(s): Nidhi Goyal | Naveen Hemrajani
Volume: 4
Year: 2013
Why do you need a reservation system?      Save time & money - Smart Internet Solutions