International Journal of Communications, Network and System Sciences

International Journal of Communications, Network and System Sciences

ISSN Print: 1913-3715
ISSN Online: 1913-3723
www.scirp.org/journal/ijcns
E-mail: ijcns@scirp.org
"Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols"
written by Boris S. Verkhovsky,
published by International Journal of Communications, Network and System Sciences, Vol.3 No.12, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A Quotient-Free Inverse Recurrence Relation for Modular Inversion
Available at SSRN 4098578, 2022
[2] A Note on the Computation of the Modular Inverse for Cryptography
2021
[3] A general method for to decompose modular multiplicative inverse operators over Group of units
2018
[4] A novel integrated approach using Euclid's and fuzzy logic for secure communication
2018
[5] A novice cryptosystem based on nth root of Gaussian integers
2017
[6] On the decomposition of modular multiplicative inverse operators via a new functional algorithm approach to Bachet's-Bezout's Lemma
Journal of Physics: Conference Series, 2017
[7] A novice cryptosystem based on n th root of Gaussian integers
2017
[8] Application of Euclid distance-based fuzzy similarity priority ratio method to quantitative decision-makings concerning seed introduction of lawn grass
2014
[9] Исследование методов вычисления инверсии в алгоритме NTRU
Прикладная …, 2013
[10] Space Complexity of Algorithm for Modular Multiplicative Inverse
Int'l J. of Communications, Network and System Sciences, 2011
[11] Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
Int'l J. of Communications, Network and System Sciences, 2011
[12] Information Protection Based on Extraction of Square Roots of Gaussian Integers
Int'l J. of Communications, Network and System Sciences, 2011
[13] Space Complexity of Algorithm for Modular Multiplicative Inverse.
2011
[14] Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols Open Access
BS Verkhovsky - scirp2.org, 2011
[15] Information Protection Based on Extraction of Square Roots of Gaussian Integers Open Access
BS Verkhovsky - scirp2.org, 2011
[16] Information Protection Based on Extraction of Square Roots of Gaussian Integers.
2011
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top