Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms

Hala Bahjat Abdul Wahab; Suhad Malallah Kadhem; Estabraq Abdul Redaa Kadhim

Volume 32, 2B , January 2014, , Page 333-346

https://doi.org/10.30684/etj.32.2B.15

Abstract
  The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic ...  Read More ...
Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network
Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network

Enas H. Salih; Mohamad AB. Saleh; Mohammed Gheni Alwan

Volume 30, Issue 11 , June 2012, , Page 1971-1979

https://doi.org/10.30684/etj.30.11.11

Abstract
  Neural network has been emerged the cryptography field as efficient tool for both cryptanalysis and cryptography due to its amazing ability to explore solution space for a given problem. ...  Read More ...
Proposal to Complex DES Security Using Diffie Hellman Injection
Proposal to Complex DES Security Using Diffie Hellman Injection

Shatha habeeb Jafar

Volume 29, Issue 6 , April 2011, , Page 1216-1226

https://doi.org/10.30684/ etj.29.6.15

Abstract
  Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the ...  Read More ...