[In-person]Mathematical modeling for cryptography using Mayan technique

Mathematical modeling for cryptography using Mayan technique
ID:147 Submission ID:346 View Protection:ATTENDEE Updated Time:2025-12-23 13:18:53 Hits:300 In-person

Start Time:2025-12-30 11:00 (Asia/Amman)

Duration:15min

Session:[S6] Special Track 1 : Mathematical Modeling for Electrical and Electronic Engineering: Theory, Methods, and Applications » [S6] Special Track 1 : Mathematical Modeling for Electrical and Electronic Engineering: Theory, Methods, and Applications

No files

Abstract
Data protection is explaining a huge trade in the modern era; the wide communication expansion designed for this area increased attention from all sorts of sides (friends and foes); integral techniques have perfected a decent role in several approaches that are suggested to be applied in the cryptography area.  In this article, the Mayan integral technique has been applied as an aspect of a symmetric key system via implementing a practical example in encryption and decryption; the Mayan integral transform has shown its capability to be invested in cryptography and in the data security area in general.

Keywords
Mayan integral transform,Cryptosystem,Symmetric key system,Asymmetric key system,cybercrime,transparent institutions
Speaker
Nour K Salman
Faculty Member Mustansiriyah University

Submission Author
Nour K Salman Mustansiriyah University
Talat Jassim Aldhlki Mustansiriyah University
Emad A. Kuffi Mustansiriyah University
Ahmad Qazza Zarqa University
Rania Saadeh Al-Balqa Applied University
Zakaria Che Muda Malaysia;Faculty of Engineering and Quantity Surveying INTI-IU University Nilai
Comment submit
Verification code Change another
All comments

CONTACT US

Email: asiancomnet@usssociety.org

Website & IT Support: hi@aconf.org 

Registration Submit Paper