The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri

Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-...

Full description

Saved in:
Bibliographic Details
Main Authors: Azman, Nurin Aisyah, Aziz, Nurul Hazirah, Wan Muhammad Sukri, Wan Nur Akliema
Format: Student Project
Language:English
Published: 2022
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/80631/1/80631.pdf
https://ir.uitm.edu.my/id/eprint/80631/
Tags: Add Tag
No Tags, Be the first to tag this record!