[1] |
Al-Ukaily, Hanan A.A., “Using(ADI)method to find anumerical solution of fractional partial differential equation” un published M.S.C.Tikrit University 2015. |
[2] |
Bruce Schneier, John Wiley, and Sons, Inc. Applied cryptography, second Edition, ISBN.0471128457 Pub Data : 1/1/1996. |
[3] |
Agnew, G.B., “Random sources for cryptographic systems” Advances in cryptographic . EURO CRXPT 87 (LNCS 304), 77-81, 1988. · Zbl 1464.94023 |
[4] |
Angulo, J. M.; Ruiz-Medina, M. D.; Anh, U. V.; Grecksch, W., Fractional diffusion and fractional heat equation, Adv. Appl. prob, 32, 1077-1099 (2000) · Zbl 0986.60077 · doi:10.1017/S0001867800010478 |
[5] |
Bellaro, M.; Kilian, J.; Rogaway, P., the security of the cipher block chaining message authentication code, Journal of Computer and System Sciences, 61, 3, 362-399 (2000) · Zbl 0970.68054 · doi:10.1006/jcss.1999.1694 |
[6] |
Abu Hammad, M.; Khalil, R., . conformable fractional heat differential equation, International Journal of Pure and Applied Mathematics, 94 · Zbl 1321.34008 |
[7] |
Goldwasser, Shafi and Bellare, Mihir. 2001. Lecture Notes on Cryptography. MIT, Cambridge, Massachusetts. Link: https://crisesdeim.urv.cat/criptologia/goldwasserbellarelecturenoteson cryptography.pdf No.2, 2014, 215-221 · Zbl 0722.68042 |