A novel cryptographic key technique
| dc.contributor.author | Kester Q.-A. | |
| dc.contributor.author | Danquah P. | |
| dc.date.accessioned | 2025-03-06T18:11:43Z | |
| dc.date.accessioned | 2025-03-06T18:59:08Z | |
| dc.date.issued | 2012 | |
| dc.description.abstract | This paper sets out to contribute to the general body of knowledge in the area of cryptography application and to support classification of secret information by developing a cipher algorithm to produce the ciphertext and also to decrypt ciphertext The algorithm ultimately makes it possible for the public keys to serve as a key for encryption and decryption as well as for authentication. � 2012 IEEE. | |
| dc.description.sponsorship | IEEE | |
| dc.identifier.doi | 10.1109/ICASTech.2012.6381068 | |
| dc.identifier.isbn | 978-146734788-4 | |
| dc.identifier.uri | http://162.250.124.58:4000/handle/123456789/453 | |
| dc.language.iso | en | |
| dc.source | Proceedings of the 2012 IEEE 4th International Conference on Adaptive Science and Technology, ICAST 2012 | |
| dc.subject | Cryptography | |
| dc.subject | Encryption | |
| dc.subject | Private Key | |
| dc.subject | Pubic Key Encryption | |
| dc.title | A novel cryptographic key technique | |
| dc.type | Other | |
| oaire.citation.conferenceDate | 25 October 2012 through 27 October 2012 | |
| oaire.citation.conferencePlace | Kumasi |
