UCSY's Research Repository

Browsing by Author "Hla, Ni Ni"

Browsing by Author "Hla, Ni Ni"

Sort by: Order: Results:

  • Hla, Ni Ni; Aung, Tun Myat (Advances in Intelligent Systems and Computing (IEMIS 2018 Vol. 1), 2018-12-12)
    At the beginning the paper describes the basic properties of finite field arithmetic and elliptic curve arithmetic over prime and binary fields. Then it discusses the elliptic curve discrete logarithm problem and its ...
  • Aung, Tun Myat; Hla, Ni Ni (IEEE Proceeding of ICCCI 2019, 2019-09-02)
    Network security is a general idea to ensure information transmission over PC and portable systems. Elliptic curve cryptosystems are nowadays widely used in public communication channels for network security. Their ...
  • Aung, Tun Myat; Hla, Ni Ni (IEEE Proceeding of ICCCI 2019, 2019-09-02)
    The rapid development of electronic exchange of digital information increases the importance of information security in storage and transmission of data on public communication network. Cryptography has emerged as ...
  • Aung, Tun Myat; Naing, Htet Htet; Hla, Ni Ni (International Journal of Machine Learning and Computing, 2019-06)
    Fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission on public communication networks. Cryptography has come up as a solution ...
  • Aung, Tun Myat; Myint, Kaung Htet; Hla, Ni Ni (Advances in Intelligent Systems and Computing (ICO 2018), 2018-09-28)
    Short Message Service (SMS) is a text messaging service component of mobile communication systems. It uses standardized communications protocols to exchange short text between mobile devices. SMS does not have any built-in ...
  • Hla, Ni Ni; Aung, Tun Myat (Journal of Communications, 2019-04)
    Elliptic curve cryptosystems are nowadays widely used in public communication channels for network security. Their security depends on the complexity of solving the elliptic curve discrete logarithm problem. But, there ...
  • Aung, Tun Myat; Hla, Ni Ni (International Journal of Engineering Research & Technology (IJERT), 2017-08)
    The security of elliptic curve cryptosystems depends on the difficulty of solving the Elliptic Curve Discrete Log Problem (ECDLP). Elliptic curves with large group order are used for elliptic curve cryptosystems not to ...
  • Hla, Ni Ni; Aung, Tun Myat (International Journal of Engineering Research & Technology (IJERT), 2017-08)
    Many cryptographic protocols are based on the difficulty of factoring large composite integers or a related problem. Therefore, we implement the finite field arithmetic operations for large prime and binary fields by ...
  • Kyaw, Kay Zar; Hla, Ni Ni (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Sequential Pattern mining is an important data mining field with wide range of applications that can extract frequent sequences while maintaining their order. It is important to identify item intervals of sequential patterns ...
  • Aye, Pyae Pyae; Hla, Ni Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The current development of Web applications such as Blogs and Wikipedia enables users to easily create and disseminate their contents in the Web. As the contents on the Web are rapidly growing, the quantity of information ...
  • Aung, Tun Myat; Hla, Ni Ni (Proceeding of Symbolic Computation and Cryptolog, 2008)
    In this paper we propose the construction of nonlinear pseudorandom sequence from the group of points over an elliptic curve. This method is based on an elliptic curve (EC), a linear feedback shift register and a random ...
  • Aung, Tun Myat; Hla, Ni Ni (International Journal of Information, Control and Computer Sciences, 2017-11)
    This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. ...
  • Thu, Phoo Pyaie; Hla, Ni Ni (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Data can be analyzed with a specific purpose and the results are to be reported for user. Decision making is the selection of a course of action from a number of possible alternatives on the basis of various forms of ...

Search Repository

Browse

My Account