Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sharma, P. L.
- A Public Key Cryptosystem Using Normal Bases Over Finite Fields
Abstract Views :347 |
PDF Views:1
Authors
P. L. Sharma
1,
Kiran Devi
1
Affiliations
1 Department of Mathematics and Statistics, Himachal Pradesh University, Shimla 171 005, IN
1 Department of Mathematics and Statistics, Himachal Pradesh University, Shimla 171 005, IN
Source
International Journal of Technology, Vol 6, No 2 (2016), Pagination: 143-149Abstract
Normal bases and matrices are widely used in cryptography to enhance the speed of cryptographic algorithms and provide security to the messages which travel through the insecure channels. We propose a public key cryptosystem using normal bases and trace mapping of normal elements over finite fields.Keywords
Normal Basis, Trace Mapping, Normal Element, Finite Field, Helical Traverse Form.- Balanced Incomplete Block Design (Bibd) Using Hadamard Rhotrices
Abstract Views :216 |
PDF Views:0
Authors
P. L. Sharma
1,
S. Kumar
1
Affiliations
1 Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, IN
1 Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, IN
Source
International Journal of Technology, Vol 4, No 1 (2014), Pagination: 62-66Abstract
Hadamard matrices have received much attention in the recent past, owing to their well-known and promising applications. Various researchers have used Hadamard matrices to find their applications in image analysis, signal processing, coding theory, cryptology and combinatorial designs. Now, Hadamard rhotrices have been introduced in the literature for the above said applications. Balanced incomplete block design has its wide use in design of experiments in statistics and error-correcting codes. Design of experiments has broad applications across all the natural and social sciences, and engineering. Here, in the present paper, we develop balanced incomplete block design (BIBD) using Hadamard rhotrices.Keywords
Hadamard Matrix, Hadamard Rhotrix, Incidence Matrix, Balanced Incomplete Block Design.- An Application of Finite Field in Hill Cipher
Abstract Views :177 |
PDF Views:0
Authors
P. L. Sharma
1,
S. Sharma
1
Affiliations
1 Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, IN
1 Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, IN
Source
International Journal of Technology, Vol 4, No 1 (2014), Pagination: 248-251Abstract
Lester S. Hill in 1929 introduced non-singular matrices to encrypt and decrypt the message in the symmetric key cryptography. Block ciphers designing and cryptographic hash functions have the use of matrices. Here, we introduce permutations, iterations and finite field in the Hill cipher to provide more security and make it free from vulnerable attacks.Keywords
Encryption, Decryption, Finite Field, Hill Cipher.- Modified Hill Cipher Using Vandermonde Matrix and Finite Field
Abstract Views :181 |
PDF Views:0
Authors
P. L. Sharma
1,
M. Rehan
1
Affiliations
1 Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, IN
1 Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, IN