ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS
Abstract
Keywords
References
- Diffie, W, & Hellman, M (1998). New directions in cryptography. IEEE Transactions on Information Theory,
- Luma, A, & Raufi, B (2009). New data encryption algorithm and its implementation for online user authentication. Security and Management, 81-85.
- Luma, A, & Raufi, B (2010). Relationship between fibonacci and lucas sequences and their application in symmetric cryptosystems.4th International Conference on Circuits, Systems and Signals, 146-150.
- Luma, A, & Zeqiri, N (2008). Data encryption using an algorithms implemented in RSA algorithm. International Conference in Information Systems Security, 146-149.
- Mollin, R.A (2007). An Introduction To Cryptography. Chapmann & Hall.
- Vaudenay, S (2006). Classical introduction to cryptography: Applications for Communications Security. Springer Science & Business Media, Inc.
Details
Primary Language
English
Subjects
-
Journal Section
-
Authors
Artan Luma
This is me
Faculty of Contemporary Sciences and Technologies, South East European University Ilindenska nn, 1200, Tetovo, Macedonia
Bujar Raufi
This is me
Faculty of Contemporary Sciences and Technologies, South East European University Ilindenska nn, 1200, Tetovo, Macedonia
Xhemal Zenuni
This is me
Faculty of Contemporary Sciences and Technologies, South East European University Ilindenska nn, 1200, Tetovo, Macedonia
Publication Date
July 23, 2016
Submission Date
July 23, 2016
Acceptance Date
-
Published in Issue
Year 2012 Volume: 2 Number: 2