Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis
Details
The content you want is available to Zendy users.Already have an account? Click here. to sign in.