Do you want to publish a course? Click here

Linear Diophantine equation as public key of cryptography use ternary number system

معادلة ديوفانتس الخطية كمفتاح عام في التشفير باستخدام نظام العد الثلاثي

1685   4   69   0 ( 0 )
 Publication date 2017
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

In this paper , we will define multiple orthogonal vector of Diophantine equation on specific conditions. We will solve the Diophantine equation with this vector in ternary number system and develop special relationships for it , {0,1,2} , then we will present a new public key cryptosystem based on multiple orthogonal vector with an example to illustrate the system.

References used
KOBLITZ.N-1987 A course in number theory and cryptography, New York , Spring
ROSEN,K.H-1983 Elementary number theory and it is applications December.p462
DING,C,D.Pei and SALOMAA,A–1996 Chinese remainder theorem application in computing , coding , cryptography August
rate research

Read More

In this paper, we introduce an algorithm to solve the Advection equation by finite element method. In this method, we have chosen Three pattern of cubic B-Spline to approximate the nonlinear solution to convert the nonlinear PDE into a system of ODE, Then we solved this system equation by SSP-RK54 method, And we made a program implementing this algorithm and we checked the program using some examples, which have exact solutions, then we evaluate our results. As a conclusion we found that this method gives accurate results for advection equation.
In this paper , we will study the ability to solve Pell's equation in the set Z, we give necessary and sufficient conditions to solve this equation , depending on the ideals in orders of the real quadratic fields .We also introduce the formula of the opposite ideal for every solution of this equation , in special cases.
The paper begins with an introduction that describes the concept and importance of power system security. The mathematical model is built depending on both the linear load flow technique and the sensitivity factors for line and generation outages. The algorithm has been designed so that a power system of arbitrary bus number and voltage levels can be studied. This algorithm has been programmed in Borland Pascal in interactive mode, and the developed program has been tested on several test systems. The Program has been used for security assessment of a part of the Syrian 230 kV network. The obtained results have shown the validity and effectiveness of the program in spite of using linear models. It is worth saying that the developed program is the first one for security assessment in Syria so far.
This paper describes the ISTIC's submission to the Triangular Machine Translation Task of Russian-to-Chinese machine translation for WMT' 2021. In order to fully utilize the provided corpora and promote the translation performance from Russian to Chi nese, the pivot method is used in our system which pipelines the Russian-to-English translator and the English-to-Chinese translator to form a Russian-to-Chinese translator. Our system is based on the Transformer architecture and several effective strategies are adopted to improve the quality of translation, including corpus filtering, data pre-processing, system combination and model ensemble.

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا