[PDF][PDF] Ecc over rsa for asymmetric encryption: A review

K Gupta, S Silakari - International Journal of Computer Science Issues …, 2011 - Citeseer
Cryptography is used to transmit the data securely in open network. This paper gives the
survey of Elliptic Curve Cryptosystem (ECC) used in many applications. ECC is a when …

Generating powerful encryption keys for image cryptography with chaotic maps by incorporating collatz conjecture

A Al-Hyari, C Obimbo, M Mua'ad, I Al-Taharwa - IEEE Access, 2024 - ieeexplore.ieee.org
In recent years, the chaotic logistic map key (CLMK) has been widely used for image
encryption due to its ability to generate random and unpredictable sequences of numbers …

[PDF][PDF] Fog computing: Comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology

MT Dong, X Zhou - Open Access Library J, 2016 - file.scirp.org
Fog computing extends cloud computing, provides the services like data, compute, storage
and application to end user. It improves the quality of service and also reduces latency …

[HTML][HTML] Lychrel Numbers in Base 10: A Probabilistic Approach

RS Kuitché - Advances in Pure Mathematics, 2024 - scirp.org
For decades, Lychrel numbers have been studied on many bases. Their existence has been
proven in base 2, 11 or 17. This paper presents a probabilistic proof of the existence of …

NOVEL SEQUENCES OF PALINDROMIC PRIMES IN VARIOUS BASES.

R Venkat, MR Schwob - International Journal of Advanced …, 2021 - search.ebscohost.com
Palindromic numbers have intrigued amateur mathematicians and number theorists alike.
Initially regarded as recreational mathematics, these numbers have been extensively …