Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.11889/1243
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Darweesh, Kamal | - |
dc.date.accessioned | 2016-07-13T09:22:13Z | - |
dc.date.accessioned | 2016-08-16T09:17:30Z | - |
dc.date.available | 2016-07-13T09:22:13Z | - |
dc.date.available | 2016-08-16T09:17:30Z | - |
dc.date.issued | 2006 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11889/1243 | - |
dc.language.iso | en | en_US |
dc.publisher | Birzeit University | en_US |
dc.subject | Curves, Elliptic - Data processing | en_US] |
dc.subject | Cryptography - Data processing | en_US] |
dc.subject | Computer networks - Security measures | en_US] |
dc.subject | Data encryption (Computer science) | en_US] |
dc.subject | Public key cryptography | en_US] |
dc.title | Efficient elliptic curve cryptosystems using efficient exponentiation | en_US |
dc.type | Thesis | en_US |
newfileds.department | Engineering and Technology | en_US |
newfileds.custom-issue-date | 2006 | en_US |
newfileds.item-access-type | open_access | en_US |
newfileds.thesis-prog | Scientific Computation | en_US |
item.languageiso639-1 | other | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
Appears in Collections: | Theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
thesis_91.pdf | 609.91 kB | Adobe PDF | View/Open |
Page view(s)
44
Last Week
0
0
Last month
2
2
checked on Apr 14, 2024
Download(s)
45
checked on Apr 14, 2024
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.