في هذا البحث نناقش مسألة تحديد أحد حلول التطابق التكعيبي
و قمنا بتوظيف النتائج التي حصلنا عليها في تشفير البيانات.
In This Paper we will determine the solution of the congruence
and apply the results in cryptography.
References used
DENCE, J.B. ,and DENCE,T.P., (1999) ˗ Elements of the theory of numbers. Missouri J. Math . sci. , 10 , 217-239P
IRELAND, K & ROSEN, M,( 1990) ˗ A Classical Introduction to Modern Number Theory, Springer -Verlag , New York, Inc,28-33 P
K, NEAL,(1987)-A course in Number Theory and Cryptography, Springer –Verlag, 33-123P
This thesis presents new mechanisms and methods for encryption from algorithms and mathematical theories with their proofs. Methods for encryption (blinding) and decryption (decryption) within text messages have been presented.
In this paper we study the relationship between the maximal (prime)
elements of M and the maximal (prime) elements of L. We show that, if L is a
local lattice and the greatest element of M is weak principal, then M is local .
Then we define the Ja
The subject of the option exchange of important issues in the jurisprudence of
financial transactions, as it falls under the jurisprudence of the options associated
with Palmtbaiein and needs of Islamic banks in their commercial transactions, as
p
Quantum Computers can be considered the biggest threat against cryptography algorithms especially the public key algorithms. In this seminar, we will discuss Quantum Computers starting from a simple explanation about the physics and mathematics basic
Linear programming (LP, or linear optimization) is a method to
achieve the best outcome (such as maximum profit or lowest cost) in a mathematical model whose requirements are represented by linear relationships. Linear programming is a special case