Win, Cherry Kyaw; Zar, Thin Zar
(Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
Nowadays, Internet and network applications are growing very fast. Thus, people need to protect the information and to thwart the hackers. People interconnect their secret data by using cryptographic algorithms. But, the ...