Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-3 of 3 total results
A Secured Smart Card Using a Pseudorandom Affine ... - CORE
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES . By Ehab Mahmoud Mohamed, Yasien Mahmoud and Hiroshi Furukawa. ... so an adversary can’t forge the scheme.The proposed LIRKES needs a strong pseudorandom permutation (PRP) as itsbasic building block, so we introduce a new symmetric-key block ...
https://core.ac.uk/display/25875643
Average Rating (0 votes)
List of Open Access publications for International Journal ...
A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES : Ehab Mahmoud Mohamed, Yasien Mahmoud, Hiroshi Furukawa : Pages - 9 - 22 | Revised - 25-02-2010 | Published - 26-03-2010 : Full Text Available (187.85KB) MORE INFORMATION
كلية الهندسة, ج...
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES " Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa " CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
1 0
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES " Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa " CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
1 0 http://www.aun.edu.eg/faculty_engineering/arabic/dept_elec/researches.php?page=93&Dept_Code=0202 www.aun.edu.eg/faculty_engineering/arabic/dept_elec/researches.php?page=9...
<span class="highlight">A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES</span> &amp;quot; Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa &amp;quot; CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010