R Biswas, D Roy Talukdar, U Roy - SN Computer Science, 2024 - Springer
Computers typically use pseudo-random numbers generated by algorithms that produce a deterministic sequence of numbers that appear random but are predictable if the entropy of …
NAA Mustafa - Wasit Journal of Engineering Sciences, 2024 - ejuow.uowasit.edu.iq
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is …
Detection of weak target echo in the presence of strong clutter is the main objective of any RADAR. To evaluate the performance of RADAR it is required to generate the clutter of …
SS Gaur, AK Mohapatra, R Roges - Technology, 2017 - academia.edu
In this paper, we analyzed the principle and techniques of EL-Gamal and based Threshold Cryptography using GMP tool. A novel approach is proposed to provide the efficient …