I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
,
p
p
.
6
4
6
1
~
6
4
7
1
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
1
0
i
6
.
pp
6
4
6
1
-
64
7
1
6461
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m/in
d
ex
.
p
h
p
/I
JE
C
E
A
n
ew
h
y
brid
t
ex
t
e
ncry
p
tion
a
ppr
o
a
ch
o
v
er
m
o
bile
a
d
h
o
c
n
etw
o
rk
M
o
ha
m
m
e
d A
m
in
Al
m
a
ia
h
1
,
Z
ia
d Da
w
a
hd
eh
2
,
O
m
a
r
Al
m
o
m
a
ni
3
,
Adeeb
Al
s
a
a
ida
h
4
,
A
h
m
a
d
Al
-
kh
a
s
a
w
neh
5
,
Sa
leh K
ha
w
a
t
re
h
6
1
F
a
c
u
lt
y
o
f
Co
m
p
u
ter S
c
ien
c
e
s a
n
d
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
,
Kin
g
F
a
isa
l
Un
iv
e
rsit
y
,
S
a
u
d
i
A
ra
b
ia
2
S
c
h
o
o
l
o
f
Co
m
p
u
ter an
d
Co
m
m
u
n
ica
ti
o
n
En
g
in
e
e
ri
n
g
,
Un
iM
A
P
U
n
iv
e
rsity
,
M
a
la
y
sia
3
,
4
Co
m
p
u
ter Ne
tw
o
rk
a
n
d
In
f
o
rm
a
ti
o
n
S
y
ste
m
s De
p
a
rt
m
e
n
t,
T
h
e
W
o
rld
Isla
m
ic S
c
ien
c
e
s a
n
d
Ed
u
c
a
ti
o
n
Un
iv
e
rsity
,
Jo
rd
a
n
5
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter In
f
o
rm
a
ti
o
n
S
y
st
e
m
,
T
h
e
Ha
sh
e
m
it
e
Un
iv
e
rsit
y
o
f
Jo
rd
a
n
,
Jo
rd
a
n
6
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
A
l
A
h
li
y
y
a
Am
m
a
n
Un
iv
e
rsity
,
Jo
rd
a
n
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Feb
7
,
2
0
20
R
ev
i
s
ed
Ma
y
2
8
,
2020
A
cc
ep
ted
J
u
n
6
,
2
0
2
0
Da
ta
e
x
c
h
a
n
g
e
h
a
s
b
e
e
n
ra
p
i
d
l
y
in
c
re
a
se
d
re
c
e
n
tl
y
b
y
in
c
re
a
sin
g
th
e
u
se
o
f
m
o
b
il
e
n
e
tw
o
rk
s.
S
h
a
rin
g
i
n
f
o
rm
a
ti
o
n
(tex
t,
im
a
g
e
,
a
u
d
io
a
n
d
v
id
e
o
)
o
v
e
r
u
n
se
c
u
re
d
m
o
b
il
e
n
e
tw
o
rk
c
h
a
n
n
e
ls
is
li
a
b
le
f
o
r
a
tt
a
c
k
in
g
a
n
d
ste
a
li
n
g
.
En
c
ry
p
ti
o
n
tec
h
n
iq
u
e
s
a
re
th
e
m
o
st
su
it
a
b
le
m
e
th
o
d
s
to
p
r
o
tec
t
i
n
f
o
rm
a
ti
o
n
f
ro
m
h
a
c
k
e
rs.
Hill
c
ip
h
e
r
a
lg
o
rit
h
m
is
o
n
e
o
f
s
y
m
m
e
tri
c
tec
h
n
iq
u
e
s,
it
h
a
s
a
si
m
p
le
stru
c
tu
re
a
n
d
f
a
st
c
o
m
p
u
tatio
n
s,
b
u
t
w
e
a
k
se
c
u
rit
y
b
e
c
a
u
se
se
n
d
e
r
a
n
d
re
c
e
iv
e
r
n
e
e
d
to
u
se
a
n
d
sh
a
r
e
th
e
sa
m
e
p
riv
a
te
k
e
y
w
it
h
in
a
n
o
n
-
se
c
u
re
c
h
a
n
n
e
l
.
T
h
e
re
f
o
re
,
a
n
o
v
e
l
h
y
b
rid
e
n
c
ry
p
ti
o
n
a
p
p
r
o
a
c
h
b
e
tw
e
e
n
e
ll
ip
ti
c
c
u
rv
e
c
r
y
p
to
s
y
ste
m
a
n
d
h
il
l
c
ip
h
e
r
(ECCHC)
is
p
ro
p
o
se
d
i
n
th
i
s
p
a
p
e
r
to
c
o
n
v
e
rt
Hill
Ci
p
h
e
r
f
ro
m
s
y
m
m
e
tri
c
tec
h
n
i
q
u
e
(
p
riv
a
te
k
e
y
)
to
a
sy
m
m
e
tri
c
o
n
e
(p
u
b
li
c
k
e
y
)
a
n
d
in
c
re
a
se
it
s
se
c
u
rit
y
a
n
d
e
ff
i
c
ien
c
y
a
n
d
re
sist
th
e
h
a
c
k
e
rs.
T
h
u
s,
n
o
n
e
e
d
to
sh
a
re
th
e
se
c
re
t
k
e
y
b
e
t
w
e
e
n
s
e
n
d
e
r
a
n
d
re
c
e
iv
e
r
a
n
d
b
o
t
h
c
a
n
g
e
n
e
ra
te
it
f
ro
m
th
e
p
riv
a
te
a
n
d
p
u
b
li
c
k
e
y
s.
T
h
e
re
f
o
re
,
th
e
p
ro
p
o
se
d
a
p
p
ro
a
c
h
p
re
se
n
ts a n
e
w
c
o
n
tri
b
u
ti
o
n
b
y
it
s a
b
il
it
y
to
e
n
c
r
y
p
t
e
v
e
r
y
c
h
a
ra
c
ter
i
n
th
e
1
2
8
A
S
CII
tab
le
b
y
u
sin
g
it
s
A
S
CII
v
a
lu
e
d
irec
t
w
it
h
o
u
t
n
e
e
d
in
g
to
a
ss
ig
n
a
n
u
m
e
ric
a
l
v
a
lu
e
f
o
r
e
a
c
h
c
h
a
ra
c
ter.
T
h
e
m
a
in
a
d
v
a
n
tag
e
s
o
f
th
e
p
ro
p
o
se
d
m
e
th
o
d
a
re
re
p
re
se
n
ted
in
th
e
c
o
m
p
u
tatio
n
sim
p
li
c
it
y
,
se
c
u
ri
ty
e
ff
ici
e
n
c
y
a
n
d
f
a
ste
r
c
o
m
p
u
tatio
n
.
K
ey
w
o
r
d
s
:
ASC
I
I
c
ode
E
n
cr
y
p
tio
n
Dec
r
y
p
tio
n
E
llip
tic
c
u
r
v
e
c
r
y
p
to
s
y
s
te
m
Hill
c
ip
h
er
Mo
b
ile
n
et
w
o
r
k
s
s
ec
u
r
it
y
Self
-
i
n
v
er
t
ib
le
k
e
y
m
atr
i
x
Co
p
y
rig
h
t
©
2
0
2
0
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Mo
h
a
m
m
ed
Am
in
Al
m
a
iah
,
Facu
lt
y
o
f
C
o
m
p
u
ter
Scien
ce
s
an
d
I
n
f
o
r
m
a
tio
n
T
ec
h
n
o
lo
g
y
,
Kin
g
Fais
a
l U
n
i
v
er
s
i
t
y
,
3
1
9
8
2
Al
-
Ah
s
a,
Sau
d
i
A
r
ab
ia
.
E
m
ail:
m
al
m
aia
h
@
k
f
u
.
ed
u
.
s
a
1.
I
NT
RO
D
UCT
I
O
N
On
m
o
b
ile
ad
h
o
c
n
e
t
w
o
r
k
,
in
f
o
r
m
atio
n
p
as
s
es
f
r
o
m
o
n
e
d
ev
ice
to
an
o
th
er
t
h
r
o
u
g
h
n
u
m
e
r
o
u
s
s
y
s
te
m
s
b
ef
o
r
e
it
r
ea
ch
es
it
s
d
esti
n
atio
n
.
So
m
e
in
f
o
r
m
a
ti
o
n
is
v
er
y
s
en
s
iti
v
e
s
u
ch
a
s
elec
tr
o
n
ic
p
a
y
m
e
n
t,
th
er
ef
o
r
e
it
s
h
o
u
ld
r
u
n
a
n
d
ex
ch
a
n
g
ed
o
v
er
th
e
n
et
w
o
r
k
i
n
a
r
o
b
u
s
t
m
an
n
er
an
d
s
a
f
el
y
[
1
]
.
A
ls
o
,
b
ec
au
s
e
th
e
m
o
b
ile
ad
h
o
c
n
et
w
o
r
k
m
ak
es
t
h
e
n
o
d
e
s
m
o
v
i
n
g
o
v
er
th
e
n
et
w
o
r
k
an
d
it
h
a
s
also
b
ec
o
m
e
w
id
el
y
u
s
e
d
n
o
w
ad
a
y
s
,
s
o
t
h
e
s
ec
u
r
it
y
r
eq
u
ir
e
m
e
n
t
s
f
o
r
th
i
s
t
y
p
e
o
f
n
et
w
o
r
k
i
s
also
in
cr
ea
s
in
g
.
T
h
er
ef
o
r
e,
th
e
s
ec
u
r
it
y
f
o
r
m
o
b
ile
ad
h
o
c
n
et
w
o
r
k
co
u
ld
b
e
o
f
f
er
ed
b
y
m
ea
n
s
cr
y
p
to
g
r
ap
h
y
alg
o
r
it
h
m
s
.
C
r
y
p
to
g
r
ap
h
y
o
v
er
m
o
b
ile
ad
h
o
c
n
et
w
o
r
k
i
s
co
n
s
id
er
ed
o
n
e
o
f
t
h
e
m
o
s
t
u
s
ed
w
a
y
s
t
o
p
r
o
tect
th
e
s
en
s
iti
v
e
i
n
f
o
r
m
atio
n
a
n
d
p
r
ev
en
t
u
n
a
u
t
h
o
r
ized
p
eo
p
le
f
r
o
m
alte
r
in
g
t
h
at
i
n
f
o
r
m
atio
n
.
C
r
y
p
to
g
r
ap
h
y
is
t
h
e
s
cie
n
ce
o
f
u
s
in
g
m
ath
e
m
atic
s
to
en
cr
y
p
t
a
n
d
d
ec
r
y
p
t
o
f
d
ata.
C
r
y
p
to
g
r
ap
h
y
en
ab
les
s
e
n
d
er
to
tr
an
s
m
it
s
e
n
s
iti
v
e
in
f
o
r
m
atio
n
(
e.
g
.
,
tex
t,
im
ag
e,
a
u
d
io
,
an
d
v
id
eo
)
ac
r
o
s
s
in
s
ec
u
r
e
n
et
w
o
r
k
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
6
4
6
1
-
6
4
7
1
6462
(
lik
e
th
e
I
n
ter
n
et)
s
o
th
at
it
ca
n
n
o
t
b
e
r
ea
d
b
y
an
y
o
n
e
ex
c
ep
t
th
e
in
ten
d
ed
r
ec
ip
ien
t.
W
h
ile
cr
y
p
to
g
r
ap
h
y
i
s
th
e
s
cie
n
ce
o
f
s
ec
u
r
i
n
g
d
ata,
cr
y
p
ta
n
al
y
s
i
s
is
t
h
e
s
cie
n
ce
o
f
an
al
y
zi
n
g
an
d
b
r
ea
k
in
g
s
ec
u
r
e
co
m
m
u
n
icatio
n
.
C
r
y
p
tan
a
l
y
s
ts
ar
e
also
ca
lled
a
ttack
er
s
.
C
r
y
p
to
lo
g
y
e
m
b
r
ac
es
b
o
th
cr
y
p
to
g
r
ap
h
y
a
n
d
cr
y
p
tan
al
y
s
i
s
[
2
]
.
C
r
y
p
to
g
r
ap
h
ic
al
g
o
r
ith
m
i
s
a
f
u
n
ctio
n
u
s
ed
f
o
r
b
o
th
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es.
I
n
th
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
,
t
h
e
p
lai
n
tex
t
(
o
r
ig
i
n
al
d
ata)
i
s
co
n
v
er
ted
in
to
cip
h
er
tex
t
(
u
n
r
ea
d
ab
le)
b
ef
o
r
e
s
en
d
i
n
g
it
v
ia
th
e
in
ter
n
et
to
th
e
r
ec
ip
ien
t.
I
n
th
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
,
w
h
e
n
th
e
d
ata
r
ea
ch
es
to
th
e
in
te
n
d
ed
r
ec
ip
ien
t,
it
w
ill
b
e
r
etu
r
n
ed
th
e
cip
h
er
te
x
t
b
ac
k
to
th
e
o
r
ig
i
n
al
d
ata.
Sin
ce
t
h
e
cr
y
p
to
g
r
ap
h
ic
f
u
n
ctio
n
i
s
m
ai
n
l
y
d
ep
en
d
en
t
o
n
a
k
e
y
v
alu
e
n
ec
es
s
ar
y
f
o
r
b
o
th
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
[
3
]
.
T
h
e
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
ca
n
b
e
class
if
ied
i
n
to
t
w
o
m
a
in
ca
te
g
o
r
ies
w
h
ich
ar
e
s
y
m
m
e
tr
ic
k
e
y
cr
y
p
to
g
r
ap
h
ic
al
g
o
r
ith
m
s
a
n
d
as
y
m
m
etr
ic
k
e
y
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
[
4
]
.
I
n
s
y
m
m
e
tr
ic
k
e
y
cr
y
p
to
g
r
ap
h
ic
al
g
o
r
ith
m
s
,
k
e
y
s
u
s
ed
f
o
r
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es
ar
e
th
e
s
a
m
e,
as
s
h
o
w
n
i
n
Fi
g
u
r
e
1
.
T
h
is
r
eq
u
ir
es
th
at
s
e
n
d
er
an
d
r
ec
eiv
er
ag
r
ee
o
n
th
e
k
e
y
p
r
io
r
to
an
y
in
f
o
r
m
atio
n
ex
c
h
a
n
g
e,
w
h
ic
h
i
s
ca
lled
s
ec
r
et
k
e
y
[
3
,
4
]
.
S
y
m
m
etr
ic
al
g
o
r
ith
m
m
a
y
co
n
ta
in
s
tr
ea
m
cip
h
er
s
a
n
d
b
lo
ck
cip
h
er
s
.
Stre
a
m
cip
h
er
s
en
cr
y
p
t
s
s
in
g
le
b
it
o
f
p
lain
tex
t
at
a
ti
m
e,
w
h
er
ea
s
b
lo
ck
cip
h
er
s
e
n
cr
y
p
t
a
n
u
m
b
er
o
f
b
it
s
o
f
p
lai
n
te
x
t
as
a
s
i
n
g
le
u
n
it.
Hill
cip
h
er
alg
o
r
it
h
m
is
a
n
e
x
a
m
p
le
o
f
s
y
m
m
e
tr
ic
k
e
y
cr
y
p
to
g
r
ap
h
ic.
A
lt
h
o
u
g
h
,
t
h
e
Hill
cip
h
er
alg
o
r
it
h
m
o
f
f
er
s
s
ev
er
al
b
en
ef
its
li
k
e
s
i
m
p
le
s
tr
u
ctu
r
e,
h
ig
h
s
p
ee
d
an
d
h
i
g
h
t
h
r
o
u
g
h
p
u
t,
b
u
t
t
h
e
lev
el
o
f
s
ec
u
r
it
y
is
w
ea
k
,
b
ec
au
se
t
h
e
s
e
n
d
er
an
d
r
ec
ei
v
er
s
h
ar
e
t
h
e
s
a
m
e
k
e
y
(
p
r
iv
ate
k
e
y
)
v
ia
u
n
s
ec
u
r
ed
ch
an
n
els
[5
,
6
]
.
T
h
is
co
u
ld
lead
to
ea
s
il
y
d
is
co
v
er
t
h
e
e
n
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
k
e
y
s
.
Fig
u
r
e
1
.
S
y
m
m
e
tr
ic
k
e
y
cr
y
p
t
o
g
r
ap
h
ic
W
h
ile
in
a
s
y
m
m
etr
ic
k
e
y
cr
y
p
to
g
r
ap
h
ic
al
g
o
r
ith
m
s
,
t
h
e
o
p
p
o
s
ite,
w
h
er
e
t
h
e
k
e
y
u
s
ed
f
o
r
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
is
d
if
f
er
en
t
f
r
o
m
th
e
o
n
e
u
s
ed
f
o
r
en
cr
y
p
tio
n
p
r
o
ce
s
s
.
I
t is ex
tr
e
m
el
y
d
if
f
ic
u
lt to
d
et
er
m
in
e
o
n
e
k
e
y
b
y
an
al
y
z
in
g
t
h
e
o
th
er
.
T
h
is
allo
w
s
f
o
r
th
e
f
r
ee
d
is
tr
ib
u
tio
n
o
f
o
n
e
k
e
y
(
i.e
.
,
p
u
b
lic)
,
w
h
il
e
th
e
k
e
y
u
s
ed
f
o
r
d
ec
r
y
p
tio
n
is
k
ep
t
p
r
i
v
ate
(
p
r
iv
ate
k
e
y
)
[
3
,
4
]
.
E
llip
tic
cu
r
v
e
cr
y
p
to
g
r
ap
h
y
(
E
C
C
)
is
a
n
e
x
a
m
p
le
o
f
as
y
m
m
etr
ic
k
e
y
cr
y
p
to
g
r
ap
h
ic
.
Fig
u
r
e
2
illu
s
tr
ate
s
as
y
m
m
etr
ic
k
e
y
cr
y
p
to
g
r
ap
h
y
p
r
o
ce
s
s
e
s
.
Fig
u
r
e
2
.
A
s
y
m
m
etr
ic
k
e
y
cr
y
p
to
g
r
ap
h
ic
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
n
ew h
yb
r
id
text
en
cryp
tio
n
a
p
p
r
o
a
c
h
o
ve
r
mo
b
ile
a
d
h
o
c
n
etw
o
r
k
(
Mo
h
a
mme
d
A
min
A
l
ma
ia
h
)
6463
E
llip
ti
c
cu
r
v
e
cr
y
p
to
g
r
ap
h
y
(
E
C
C
)
is
o
n
e
o
f
th
e
e
f
f
ec
tiv
e
a
s
y
m
m
etr
ic
k
e
y
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
w
h
ic
h
d
ep
en
d
s
o
n
th
at
s
e
n
d
er
u
s
es
a
k
e
y
d
i
f
f
er
th
an
t
h
e
r
ec
eiv
er
’
s
p
r
iv
a
te
k
e
y
a
n
d
ea
ch
p
ar
t
y
g
e
n
er
ates
th
e
p
u
b
lic
an
d
s
ec
r
et
k
e
y
s
ep
ar
atel
y
af
ter
ag
r
ee
i
n
g
o
n
ellip
ti
c
cu
r
v
e
d
o
m
ain
p
ar
a
m
eter
s
[
1
,
2
]
.
E
C
C
p
r
o
v
id
es
a
s
m
aller
k
e
y
s
ize
w
it
h
r
ed
u
ci
n
g
s
to
r
ag
e
an
d
tr
an
s
m
is
s
io
n
r
eq
u
ir
e
m
e
n
ts
a
s
co
m
p
ar
ed
to
o
th
er
alg
o
r
it
h
m
s
li
k
e
R
S
A
[
6
,
7
]
.
T
h
is
m
ea
n
s
th
at
t
h
at
a
n
ellip
tic
c
u
r
v
e
alg
o
r
it
h
m
co
u
ld
p
r
o
v
id
e
th
e
s
a
m
e
lev
e
l
o
f
s
ec
u
r
i
t
y
af
f
o
r
d
ed
b
y
an
R
S
A
-
b
a
s
ed
s
y
s
te
m
w
it
h
a
lar
g
e
m
o
d
u
l
u
s
a
n
d
co
r
r
esp
o
n
d
in
g
l
y
lar
g
er
k
e
y
:
f
o
r
e
x
a
m
p
l
e,
a
2
5
6
-
b
it e
llip
tic
cu
r
v
e
p
u
b
lic
k
e
y
s
h
o
u
ld
p
r
o
v
id
e
co
m
p
ar
ab
le
s
ec
u
r
it
y
to
a
3
0
7
2
-
b
it R
S
A
p
u
b
lic
k
e
y
.
I
n
f
ac
t,
s
e
v
er
al
r
esear
ch
er
s
h
av
e
in
d
icate
d
t
h
at
t
h
e
p
r
o
b
le
m
a
s
s
o
ciate
d
w
it
h
t
h
e
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
s
is
t
h
e
s
ec
u
r
it
y
th
at
ca
n
b
e
p
r
o
v
id
ed
.
T
h
is
m
ea
n
s
th
at
t
h
e
s
tr
e
n
g
t
h
o
f
a
n
y
cr
y
p
t
o
g
r
ap
h
ic
alg
o
r
it
h
m
d
ep
en
d
s
o
n
th
e
s
tr
en
g
t
h
o
f
t
h
e
k
e
y
s
u
s
ed
.
I
n
o
th
er
w
o
r
d
s
,
th
e
p
r
o
b
lem
o
f
lo
w
-
le
v
el
s
ec
u
r
it
y
o
f
a
n
y
al
g
o
r
it
hm
ar
is
es
f
r
o
m
t
h
e
w
ea
k
en
cr
y
p
ti
o
n
an
d
d
ec
r
y
p
tio
n
k
e
y
s
t
h
at
h
av
e
b
ee
n
u
s
ed
a
n
d
b
ec
au
s
e
o
f
th
e
r
ap
id
g
r
o
w
t
h
i
n
f
ac
to
r
izatio
n
al
g
o
r
ith
m
s
;
w
e
ak
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
ti
o
n
k
e
y
s
w
er
e
ea
s
il
y
f
ac
to
r
ed
an
d
d
is
co
v
er
ed
.
T
o
o
v
er
co
m
e
t
h
is
p
r
o
b
le
m
an
d
to
p
r
o
v
id
e
a
g
o
o
d
lev
el
s
ec
u
r
i
t
y
,
th
e
u
s
ed
k
e
y
s
s
h
o
u
ld
b
e
p
o
w
er
f
u
l e
n
o
u
g
h
[
3
]
.
I
n
th
i
s
w
o
r
k
a
n
e
w
en
cr
y
p
t
io
n
an
d
d
ec
r
y
p
tio
n
m
et
h
o
d
b
ased
o
n
co
m
b
i
n
in
g
t
h
e
elli
p
tic
cu
r
v
e
cr
y
p
to
s
y
s
te
m
(
E
C
C
)
w
i
th
h
il
l
cip
h
er
(
HC
)
al
g
o
r
ith
m
,
w
h
ic
h
is
ca
lled
(
E
C
C
HC
)
.
T
h
is
n
e
w
ap
p
r
o
ac
h
s
tar
t
s
wi
t
h
a
g
r
ee
o
f
b
o
t
h
s
e
n
d
er
an
d
r
ec
eiv
er
to
s
h
ar
e
th
e
d
o
m
ain
p
ar
a
m
eter
s
t
h
r
o
u
g
h
e
llip
tic
c
u
r
v
e
f
u
n
ctio
n
.
T
h
en
i
t
g
en
er
ate
s
t
h
e
p
r
iv
ate
a
n
d
p
u
b
lic
k
e
y
s
b
y
u
s
in
g
t
h
e
E
C
C
alg
o
r
ith
m
.
T
h
en
b
o
th
s
e
n
d
er
an
d
r
ec
eiv
er
h
av
e
th
e
ab
ilit
y
to
p
r
o
d
u
ce
t
h
e
s
ec
r
et
k
e
y
u
s
i
n
g
t
h
e
s
el
f
-
i
n
v
er
tib
le
k
e
y
m
atr
i
x
,
t
h
u
s
n
o
n
ee
d
t
o
s
h
ar
e
it
th
r
o
u
g
h
th
e
i
n
ter
n
et
o
r
u
n
s
ec
u
r
ed
co
m
m
u
n
icatio
n
c
h
a
n
n
el.
A
ls
o
,
th
e
s
a
m
e
k
e
y
ca
n
b
e
u
s
ed
f
o
r
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
(
th
e
m
atr
ix
is
s
el
f
-
in
v
er
t
ib
le
i
f
(
1
kk
)
,
an
d
n
o
n
ee
d
t
o
f
i
n
d
t
h
e
i
n
v
er
s
e
k
e
y
m
atr
ix
.
T
h
e
ai
m
o
f
u
s
i
n
g
th
e
p
r
o
p
o
s
ed
s
elf
-
in
v
er
ti
b
le
k
e
y
m
atr
ix
i
n
t
h
is
s
tu
d
y
is
:
-
T
o
o
v
er
co
m
e
t
h
e
p
r
o
b
lem
i
n
Hill
cip
h
er
alg
o
r
it
h
m
,
w
h
ic
h
i
s
th
at
t
h
e
in
v
er
s
e
o
f
t
h
e
k
e
y
m
atr
i
x
d
o
es
n
o
t
al
w
a
y
s
e
x
i
s
t.
So
,
i
f
th
e
k
e
y
m
atr
ix
i
s
n
o
t
in
v
er
ti
b
le,
th
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
ca
n
n
o
t
b
e
d
o
n
e,
an
d
th
e
r
ec
eiv
er
ca
n
n
o
t
g
et
th
e
o
r
ig
in
al
d
ata.
-
T
o
o
v
er
co
m
e
t
h
e
p
r
o
b
le
m
o
f
d
is
tr
ib
u
ti
n
g
t
h
e
s
ec
r
et
k
e
y
an
d
to
m
ak
e
t
h
e
p
r
o
p
o
s
ed
alg
o
r
it
h
m
m
o
r
e
s
ec
u
r
e
an
d
d
if
f
icu
l
t o
r
ev
en
i
m
p
o
s
s
ib
l
e
to
b
e
b
r
o
k
en
an
d
-
T
o
o
v
er
co
m
e
th
e
p
r
o
b
le
m
o
f
d
elay
in
g
t
h
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
.
Ma
j
o
r
it
y
o
f
cr
y
p
to
g
r
ap
h
y
ap
p
r
o
ac
h
es
u
s
e
th
e
alp
h
ab
et
s
(
a,
b
,
c,
…,
z)
,
s
o
it
n
ee
d
s
to
as
s
ig
n
ea
c
h
c
h
ar
ac
ter
to
n
u
m
er
ical
v
a
lu
e
t
h
r
o
u
g
h
m
ap
p
in
g
tab
le.
W
h
ile,
in
o
u
r
p
r
o
p
o
s
e
d
ap
p
r
o
ac
h
,
all
ch
ar
ac
ter
s
f
r
o
m
th
e
1
2
8
A
S
C
I
I
tab
le
ca
n
b
e
in
clu
d
ed
i
n
th
e
p
lain
te
x
t
m
ess
a
g
e
an
d
t
h
e
n
d
ec
r
y
p
ted
d
ir
ec
tl
y
b
y
it
s
ASC
I
I
v
al
u
e
w
ith
o
u
t
n
ee
d
i
n
g
t
o
ass
ig
n
it
w
it
h
n
u
m
er
ical
v
a
lu
e
f
r
o
m
m
ap
p
in
g
tab
le,
w
h
ic
h
r
ed
u
ce
s
th
e
co
m
p
u
tatio
n
al
p
r
o
ce
s
s
n
ee
d
s
d
u
r
in
g
th
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
.
T
h
u
s
,
t
h
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
w
ill b
e
f
aster
.
T
h
is
p
ap
er
is
o
r
g
an
ized
as
f
o
l
lo
w
s
.
A
n
i
n
tr
o
d
u
ctio
n
to
ellip
tic
cu
r
v
e
f
u
n
ctio
n
o
v
er
a
p
r
im
e
f
ield
i
s
in
tr
o
d
u
ce
d
in
Sectio
n
2
.
Se
ctio
n
3
d
escr
ib
es
th
e
o
r
ig
in
al
H
ill
C
ip
h
er
alg
o
r
it
h
m
.
S
ec
tio
n
4
ex
p
lain
s
th
e
p
r
o
p
o
s
e
d
h
y
b
r
id
en
cr
y
p
ti
o
n
ap
p
r
o
ac
h
.
A
n
ex
a
m
p
le
of
th
e
p
r
o
p
o
s
ed
a
p
p
r
o
ac
h
is
g
iv
en
an
d
an
al
y
ze
d
in
Sectio
n
5
.
Fin
al
l
y
,
Sect
io
n
6
s
h
o
w
s
t
h
e
co
n
cl
u
s
io
n
an
d
th
e
a
d
v
an
ta
g
es o
f
t
h
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
.
2.
L
I
T
E
R
AT
U
RE
R
E
VI
E
W
Sev
er
al
r
esear
c
h
er
s
h
av
e
tr
i
ed
to
i
m
p
r
o
v
e
t
h
e
s
ec
u
r
it
y
o
f
Hil
l
C
ip
h
er
.
I
s
m
ail
[
8
]
p
r
o
p
o
s
ed
a
n
e
w
Hill
cip
h
er
(
HillM
R
I
V)
th
at
ad
j
u
s
ti
n
g
t
h
e
e
n
cr
y
p
tio
n
k
e
y
an
d
u
s
i
n
g
a
d
i
f
f
er
e
n
t
k
e
y
f
o
r
ea
c
h
p
lai
n
te
x
t
b
lo
ck
in
s
tead
o
f
u
s
in
g
o
n
e
k
e
y
m
a
tr
ix
f
o
r
all
b
lo
ck
s
an
d
in
cr
ea
s
i
n
g
t
h
e
s
ec
u
r
it
y
o
f
Hill
alg
o
r
it
hm
.
B
ib
h
u
d
en
d
r
a
[
9
]
s
o
lv
ed
t
h
e
d
ec
r
y
p
tio
n
p
r
o
b
le
m
i
f
t
h
e
i
n
v
er
s
e
k
e
y
m
a
tr
ix
d
o
es
n
o
t
e
x
is
t
b
y
p
r
o
p
o
s
in
g
a
n
o
v
el
ad
v
an
ce
d
Hi
ll
al
g
o
r
ith
m
(
A
d
v
Hill)
th
at
u
s
es
a
n
i
n
v
o
l
u
to
r
y
k
e
y
m
atr
ix
f
o
r
en
cr
y
p
t
io
n
an
d
d
ec
r
y
p
tio
n
an
d
eli
m
i
n
ate
s
th
e
co
m
p
u
tatio
n
s
n
ee
d
ed
b
y
th
e
r
ec
ip
ien
t
to
f
i
n
d
th
e
in
v
er
s
e
k
e
y
m
atr
i
x
.
Ha
m
is
s
a
[
1
0
]
en
h
an
ce
d
Hill
cip
h
er
alg
o
r
ith
m
s
ec
u
r
it
y
b
y
u
s
i
n
g
c
h
ao
tic
f
u
n
c
tio
n
s
a
n
d
p
r
esen
ti
n
g
a
n
e
w
e
n
co
d
er
-
d
ec
o
d
er
tech
n
iq
u
e
(
C
h
ao
E
n
co
Dec
o
)
.
No
r
d
in
[
1
1
]
p
r
o
p
o
s
ed
a
n
e
w
Hill
al
g
o
r
it
h
m
(
Hi
ll++)
th
at
co
m
p
u
ted
a
r
an
d
o
m
m
atr
i
x
k
e
y
b
ased
o
n
th
e
p
r
ev
io
u
s
b
lo
ck
s
a
s
an
ex
tr
a
k
e
y
f
o
r
en
cr
y
p
tio
n
a
n
d
r
esis
ted
all
ze
r
o
es p
lain
te
x
t
b
lo
ck
s
.
Ag
r
a
w
al
an
d
Ger
a
[
1
2
]
p
r
o
d
u
ce
d
a
n
ew
m
et
h
o
d
f
o
r
en
cr
y
p
ti
o
n
b
y
u
s
i
n
g
Hill
cip
h
er
alg
o
r
it
h
m
f
ir
s
t
t
o
p
r
o
d
u
ce
th
e
cip
h
er
te
x
t
n
u
m
er
i
ca
l
v
al
u
es,
th
e
n
co
n
v
er
t
it
to
p
o
in
ts
o
n
t
h
e
E
C
C
b
y
u
s
in
g
s
c
alar
m
u
ltip
licatio
n
.
T
h
is
m
et
h
o
d
in
cr
ea
s
ed
th
e
s
ec
u
r
it
y
b
u
t
also
i
n
cr
ea
s
ed
th
e
ti
m
e
o
f
co
m
p
u
tatio
n
s
b
ec
au
s
e
s
ca
lar
m
u
l
tip
licatio
n
co
n
s
u
m
ed
a
lo
n
g
ti
m
e.
S
h
ar
m
a
an
d
C
h
ir
g
ai
y
a
[
1
3
]
p
r
o
p
o
s
e
d
a
m
e
th
o
d
to
s
o
lv
e
t
h
e
p
r
o
b
le
m
o
f
d
ec
r
y
p
tio
n
i
n
th
e
Hill
cip
h
er
if
t
h
e
k
e
y
m
atr
i
x
is
n
o
t
i
n
v
er
tib
le,
th
e
y
s
u
g
g
es
ted
u
s
i
n
g
s
etti
n
g
o
f
f
s
et
v
alu
e
o
n
e
if
th
e
d
eter
m
i
n
an
t
o
f
a
m
a
tr
ix
is
ze
r
o
an
d
o
f
f
s
et
v
alu
e
-
1
if
th
e
d
eter
m
i
n
an
t
i
s
n
e
g
ati
v
e.
Ma
h
m
o
u
d
an
d
C
h
e
f
r
an
o
v
[
1
4
]
p
r
o
p
o
s
ed
m
o
d
if
icatio
n
f
o
r
t
h
e
Hill
c
ip
h
er
(
H
C
M
-
P
R
E
)
t
h
at
r
esi
s
ts
k
n
o
w
n
p
lain
tex
t
-
c
ip
h
er
tex
t
attac
k
b
y
u
s
i
n
g
p
s
eu
d
o
-
r
an
d
o
m
ei
g
e
n
v
al
u
es
an
d
c
h
a
n
g
i
n
g
k
e
y
m
a
tr
i
x
d
y
n
a
m
ical
l
y
.
R
a
m
esh
[
1
5
]
in
tr
o
d
u
ce
d
an
al
g
o
r
ith
m
co
n
s
i
s
ts
o
f
f
o
u
r
s
tag
es
to
eli
m
in
a
te
t
h
e
r
ep
etitio
n
o
f
th
e
s
u
b
s
tr
i
n
g
s
a
n
d
en
h
an
c
e
th
e
s
ec
u
r
it
y
,
a
n
d
d
o
u
b
le
co
lu
m
n
ar
tr
an
s
p
o
s
itio
n
is
d
o
n
e
f
o
r
th
e
p
lain
tex
t
t
w
ice,
ea
ch
ti
m
e
b
ef
o
r
e
ap
p
l
y
i
n
g
Hill
cip
h
e
r
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
6
4
6
1
-
6
4
7
1
6464
en
cr
y
p
tio
n
.
Da
w
ah
d
e
h
[
1
6
]
p
r
o
p
o
s
ed
a
n
e
w
i
m
a
g
e
en
cr
y
p
t
io
n
tec
h
n
iq
u
e
t
h
at
co
m
b
i
n
ed
ellip
tic
c
u
r
v
e
cr
y
p
to
s
y
s
te
m
w
i
th
h
ill
cip
h
er
an
d
ap
p
lied
th
e
n
e
w
tec
h
n
iq
u
e
o
n
g
r
a
y
s
ca
le
i
m
a
g
e
s
an
d
g
o
t
a
g
o
o
d
r
esu
lts
co
m
p
ar
ed
w
it
h
o
th
er
s
i
m
ilar
te
c
h
n
iq
u
es
.
3.
E
L
L
I
P
T
I
C
C
URVE F
U
NCT
I
O
N
E
llip
tic
cu
r
v
e
cr
y
p
to
g
r
ap
h
y
(
E
C
C
)
is
a
s
u
itab
le
en
cr
y
p
tio
n
tech
n
iq
u
e
to
b
e
u
s
ed
in
m
o
b
ile
d
ev
ice
s
b
ec
au
s
e
it
ca
n
p
r
o
v
id
e
h
i
g
h
s
ec
u
r
it
y
w
it
h
s
m
al
ler
k
e
y
s
ize
an
d
f
e
w
er
co
m
p
u
tatio
n
s
w
it
h
litt
le
m
e
m
o
r
y
a
n
d
f
e
w
er
p
o
w
er
co
n
s
u
m
p
tio
n
s
.
T
h
is
s
ec
tio
n
d
escr
ib
es t
h
e
p
r
i
m
a
r
y
o
p
er
atio
n
s
r
elate
d
to
ellip
tic
cu
r
v
e
f
u
n
ctio
n
.
Def
i
n
itio
n
2
.
1
.
A
n
ellip
tic
c
u
r
v
e
o
v
er
a
p
r
im
e
f
ield
is
d
ef
in
ed
b
y
:
2
≡
3
+
+
(
)
w
h
e
r
e
,
∈
,
≠
2
,
3
,
a
n
d
s
at
is
f
y
t
h
e
c
o
n
d
i
t
io
n
4
3
+
27
2
≢
0
(
)
.
T
h
e
s
e
t
o
f
a
ll
p
o
in
ts
(
,
)
t
h
at
s
a
t
is
f
y
th
e
el
l
i
p
ti
c
cu
r
v
e
w
ith
th
e
p
o
in
t
O
a
t
th
e
i
n
f
in
i
ty
r
e
p
r
e
s
e
n
t
t
h
e
e
l
li
p
t
i
c
c
u
r
v
e
g
r
o
u
p
(
)
[1
,
1
7
].
3
.
1
.
ELLI
PTIC CU
RV
E
O
PE
RA
TIO
NS
3
.
1
.
1
.
P
o
int
a
dd
it
io
n
Su
p
p
o
s
e
=
(
1
,
1
)
an
d
=
(
2
,
2
)
,
w
h
er
e
≠
,
ar
e
tw
o
p
o
in
t
s
lie
o
n
a
n
ellip
tic
cu
r
v
e
.
A
d
d
in
g
th
e
t
w
o
p
o
in
ts
an
d
g
iv
in
g
a
th
ir
d
p
o
in
t
th
at
s
h
o
u
ld
lie
o
n
th
e
s
a
m
e
cu
r
v
e
.
D
ep
en
d
in
g
o
n
th
e
co
o
r
d
in
ates o
f
t
h
e
p
o
in
ts
an
d
,
th
er
e
ar
e
t
w
o
ca
s
es
f
o
r
th
i
s
ad
d
itio
n
[
1
2
,
1
8
]
.
I
f
≠
≠
w
ith
1
≠
2
,
th
e
s
u
m
o
f
th
e
p
o
in
t
s
an
d
is
d
ef
in
ed
b
y
=
+
=
(
3
,
3
)
w
h
er
e
=
(
2
−
1
)
(
2
−
1
)
3
≡
(
2
−
1
−
2
)
(
)
3
≡
(
1
−
3
−
1
)
(
)
I
f
1
=
2
b
u
t
1
≠
2
th
en
+
=
.
3
.
1
.
2
.
P
o
int
do
ub
lin
g
P
o
in
t
d
o
u
b
lin
g
m
ea
n
s
ad
d
in
g
th
e
p
o
in
t
=
(
1
,
1
)
th
at
lies
o
n
t
h
e
ellip
tic
cu
r
v
e
to
its
elf
.
T
h
e
p
o
in
t
th
at
r
esu
lt
s
f
r
o
m
d
o
u
b
lin
g
is
al
s
o
lies
o
n
t
h
e
ellip
ti
c
cu
r
v
e
[
1
9
,
20
]
.
=
2
=
+
=
(
3
,
3
)
w
h
er
e
=
3
1
2
+
2
1
3
≡
(
2
−
2
1
)
(
)
:
3
≡
(
1
−
3
−
1
)
(
)
3
.
1
.
3
.
Sca
la
r
m
ultiplica
t
io
n
T
h
e
s
ca
lar
m
u
ltip
licatio
n
o
f
a
n
i
n
teg
er
b
y
th
e
p
o
in
t
=
(
1
,
1
)
th
at
l
ies
o
n
t
h
e
cu
r
v
e
ca
n
b
e
d
ef
in
ed
b
y
r
ep
ea
tin
g
th
e
ad
d
it
io
n
o
f
th
e
p
o
in
t
to
it
s
elf
ti
m
es.
T
h
e
r
esu
lts
p
o
in
t
also
lies
o
n
th
e
ellip
tic
cu
r
v
e
.
=
=
+
+
⋯
+
⏟
−
Fo
r
ex
a
m
p
le,
co
m
p
u
tin
g
15
ca
n
b
e
d
o
n
e
u
s
in
g
p
o
in
t a
d
d
itio
n
a
n
d
p
o
in
t d
o
u
b
lin
g
as
f
o
llo
w
s
[
19
]
:
15
=
2
(
2
(
2
+
)
+
)
+
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
n
ew h
yb
r
id
text
en
cryp
tio
n
a
p
p
r
o
a
c
h
o
ve
r
mo
b
ile
a
d
h
o
c
n
etw
o
r
k
(
Mo
h
a
mme
d
A
min
A
l
ma
ia
h
)
6465
4.
H
I
L
L
C
I
P
H
E
R
A
L
G
O
RI
T
H
M
H
i
l
l
c
i
p
h
e
r
is
a
s
y
m
m
et
r
i
c
b
l
o
c
k
c
i
p
h
e
r
t
e
ch
n
i
q
u
e
in
v
en
t
ed
b
y
th
e
m
a
th
em
at
i
c
i
an
L
es
te
r
H
i
l
l
in
1
9
2
9
[
21
]
.
B
o
t
h
s
en
d
e
r
a
n
d
r
ec
e
i
v
e
r
s
h
o
u
l
d
s
h
a
r
e
an
d
u
s
e
th
e
s
am
e
k
ey
m
at
r
ix
f
o
r
c
i
p
h
e
r
in
g
a
n
d
d
e
ci
p
h
e
r
i
n
g
.
T
h
e
m
a
in
c
o
n
c
e
p
t o
f
th
is
t
e
ch
n
i
q
u
e
b
a
s
e
d
o
n
a
s
s
ig
n
ea
ch
l
et
t
er
b
y
a
n
u
m
e
r
i
c
al
v
a
lu
e
,
f
o
r
ex
am
p
l
e
,
a
=
0
,
b
=
1
,
…
,
z
=
2
5
.
T
h
e
n
d
iv
i
d
e
th
e
p
l
a
in
t
ex
t
(
m
ess
ag
e
)
in
t
o
b
l
o
ck
s
c
o
n
s
i
s
t
o
f
th
e
s
am
e
s
i
ze
m
d
e
p
e
n
d
i
n
g
o
n
th
e
k
ey
m
at
r
ix
s
i
z
e
mm
.
F
o
r
e
x
am
p
le
,
if
th
e
b
l
o
ck
s
i
z
e
is
tw
o
(
21
P
)
,
t
h
en
th
e
k
ey
m
a
t
r
ix
(
22
K
)
s
h
o
u
l
d
b
e
o
f
s
i
z
e
22
,
a
n
d
th
e
en
c
r
y
p
ti
o
n
p
r
o
c
es
s
w
i
ll
p
r
o
d
u
c
e
c
i
p
h
e
r
t
ex
t
w
i
th
tw
o
n
u
m
e
r
i
ca
l
v
a
lu
es
(
21
C
)
a
s
f
o
ll
o
w
s
[
1
2
]:
I
f
1
2
p
P
p
an
d
11
12
21
22
kk
K
kk
th
e
n
1
1
1
1
2
1
1
1
1
1
2
2
2
2
1
2
2
2
2
1
1
2
2
2
(
)
m
o
d
2
6
m
o
d
2
6
(
)
m
o
d
2
6
c
k
k
p
k
p
k
p
C
c
k
k
p
k
p
k
p
T
o
d
ec
r
y
p
t
t
h
e
cip
h
er
tex
t,
th
e
r
ec
ip
ien
t
n
ee
d
s
to
co
m
p
u
te
t
h
e
k
e
y
m
a
tr
ix
in
v
er
s
e
(
1
K
)
w
h
er
e
1
.,
K
K
I
I
is
th
e
id
en
ti
t
y
m
atr
i
x
,
th
e
n
u
s
e
th
e
f
o
llo
w
i
n
g
eq
u
atio
n
to
p
r
o
d
u
ce
th
e
p
lain
te
x
t (
o
r
ig
i
n
al
m
es
s
ag
e)
[
9
,
2
1
]
.
1
.
m
o
d
2
6
P
K
C
5.
T
H
E
P
RO
P
O
SE
D
CRYP
T
O
SYST
E
M
T
h
e
n
e
w
ap
p
r
o
ac
h
o
f
E
ll
ip
tic
C
u
r
v
e
C
r
y
p
to
s
y
s
te
m
a
n
d
Hill
C
ip
h
er
(
E
C
C
H
C
)
h
a
s
b
ee
n
in
t
r
o
d
u
ce
d
in
th
is
s
ec
tio
n
.
T
h
is
m
o
d
if
icatio
n
in
cr
ea
s
es
t
h
e
s
ec
u
r
it
y
an
d
m
ak
e
s
t
h
e
s
y
s
te
m
m
o
r
e
ef
f
ici
en
t
t
h
an
t
h
e
o
r
ig
i
n
al
tech
n
iq
u
e,
also
s
p
ee
d
s
u
p
th
e
d
ec
r
y
p
tio
n
co
m
p
u
ta
tio
n
s
b
ec
au
s
e
n
o
n
ee
d
to
co
m
p
u
te
th
e
k
e
y
m
atr
ix
i
n
v
er
s
e.
Su
p
p
o
s
e
User
A
(
th
e
s
e
n
d
er
)
w
a
n
t
s
to
s
en
d
a
m
e
s
s
a
g
e
to
User
B
(
th
e
r
ec
eiv
er
)
u
s
i
n
g
E
C
C
H
C
o
v
er
a
n
in
s
ec
u
r
e
c
h
an
n
el.
F
ir
s
tl
y
,
t
h
e
y
s
h
o
u
ld
ag
r
ee
o
n
t
h
e
ellip
tic
c
u
r
v
e
f
u
n
c
tio
n
an
d
s
h
ar
e
t
h
e
d
o
m
a
in
p
ar
a
m
eter
s
{
,
,
,
}
,
w
h
er
e
,
ar
e
th
e
co
e
f
f
icien
ts
o
f
t
h
e
ell
ip
tic
f
u
n
ctio
n
,
is
a
lar
g
e
p
r
i
m
e
n
u
m
b
er
,
an
d
i
s
th
e
g
en
er
ato
r
p
o
in
t.
T
h
en
ea
c
h
p
ar
t
y
n
ee
d
s
to
c
h
o
o
s
e
h
i
s
p
r
iv
ate
k
e
y
r
a
n
d
o
m
l
y
f
r
o
m
t
h
e
in
ter
v
al
[
1
,
−
1
]
;
f
o
r
User
A
a
n
d
f
o
r
User
B
.
T
h
e
p
u
b
lic
k
e
y
f
o
r
ea
ch
u
s
er
ca
n
b
e
g
en
er
ated
as
f
o
llo
w
s
=
.
=
.
E
ac
h
u
s
er
m
u
ltip
lies
h
i
s
p
r
iv
at
e
k
e
y
b
y
t
h
e
p
u
b
lic
k
e
y
o
f
th
e
o
th
er
u
s
er
to
g
et
t
h
e
i
n
itial
k
e
y
=
(
,
)
=
.
=
.
=
.
.
=
(
,
)
T
h
en
co
m
p
u
tes
1
=
.
=
(
11
,
12
)
2
=
.
=
(
21
,
22
)
N
ex
t
s
tep
i
s
g
e
n
er
atin
g
t
h
e
s
e
cr
et
k
e
y
m
atr
ix
b
y
s
e
n
d
er
an
d
r
ec
eiv
er
.
T
h
e
in
v
er
s
e
o
f
t
h
e
k
e
y
m
atr
i
x
d
o
es
n
o
t
al
w
a
y
s
ex
i
s
t.
So
,
if
th
e
k
e
y
m
atr
ix
is
n
o
t
in
v
er
t
i
b
le,
th
e
r
ec
ip
ien
t
ca
n
n
o
t
d
ec
r
y
p
t
t
h
e
cip
h
er
tex
t.
T
o
s
o
lv
e
th
is
p
r
o
b
le
m
,
t
h
e
s
e
lf
-
in
v
er
tib
le
k
e
y
m
a
tr
ix
w
i
ll
b
e
g
en
er
ated
,
an
d
t
h
e
s
a
m
e
k
e
y
w
ill
b
e
u
s
ed
f
o
r
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
(
t
h
e
m
atr
i
x
K
is
s
el
f
-
in
v
er
tib
le
i
f
1
KK
)
,
an
d
n
o
n
ee
d
to
f
i
n
d
t
h
e
i
n
v
er
s
e
k
e
y
m
atr
i
x
.
A
s
s
u
m
e
t
h
e
m
es
s
ag
e
d
iv
id
ed
in
to
b
lo
ck
s
o
f
s
ize
f
o
u
r
ch
ar
ac
ter
s
(
ad
d
s
p
ac
e
to
co
m
p
lete
t
h
e
last
b
lo
ck
,
if
n
ec
es
s
ar
y
)
.
So
,
ea
ch
p
ar
ty
p
r
o
d
u
ce
s
t
h
e
44
s
el
f
-
i
n
v
er
t
ib
le
k
e
y
m
atr
i
x
b
y
u
s
i
n
g
t
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
in
[
1
6
,
2
2
]
:
L
et
1
1
1
2
1
3
1
4
2
1
2
2
2
3
2
4
3
1
3
2
3
3
3
4
4
1
4
2
4
3
4
4
m
k
k
k
k
k
k
k
k
K
k
k
k
k
k
k
k
k
b
e
s
elf
-
i
n
v
er
tib
le
m
atr
i
x
p
ar
titi
o
n
ed
as
11
12
21
22
m
KK
K
KK
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
6
4
6
1
-
6
4
7
1
6466
T
h
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
ass
u
m
es
t
h
at
1
1
1
2
11
2
1
2
2
kk
K
kk
,
th
e
n
th
e
v
a
lu
e
s
o
f
th
e
o
th
er
p
ar
titi
o
n
s
o
f
t
h
e
s
e
cr
et
m
atr
i
x
k
e
y
m
K
is
o
b
tain
ed
b
y
s
o
lv
i
n
g
1
2
1
1
K
I
K
,
2
1
1
1
K
I
K
,
an
d
1
1
2
2
0
KK
,
w
h
er
e
I
is
th
e
id
en
ti
t
y
m
atr
i
x
.
T
h
e
m
ai
n
co
n
ce
p
t
o
f
Hill
ci
p
h
er
d
ep
en
d
s
o
n
as
s
i
g
n
i
n
g
a
n
u
m
er
i
ca
l
v
al
u
e
f
o
r
ea
ch
c
h
ar
ac
ter
i
n
th
e
p
lain
tex
t
[
23]
.
T
h
e
d
ec
im
a
l
ASC
I
I
co
d
e
tab
le
f
r
o
m
3
2
to
1
2
6
w
il
l
b
e
u
s
ed
f
o
r
th
is
is
s
u
e
(
s
p
ac
e=
3
2
,
!
=3
3
,
…,
0
=4
8
,
1
=4
9
,
…,
A
=6
5
,
B
=6
6
,
…,
a=
9
7
,
b
=9
8
,
…,
~
=1
2
6
)
,
an
d
m
o
d
9
5
w
ill
b
e
u
s
ed
in
th
i
s
ca
s
e
f
o
r
m
o
d
u
lo
.
T
h
is
m
o
d
if
ica
tio
n
c
o
n
s
id
er
ed
as
a
n
e
w
co
n
tr
ib
u
t
io
n
i
n
t
h
i
s
ap
p
r
o
ac
h
b
ec
au
s
e
all
o
th
er
m
et
h
o
d
s
en
cr
y
p
t
o
n
l
y
(
a=
0
,
b
=1
,
…,
z=
2
5
)
,
w
h
er
ea
s
all
c
h
ar
ac
ter
s
f
r
o
m
t
h
e
1
2
8
A
SC
I
I
tab
le
c
an
b
e
in
cl
u
d
ed
in
th
e
p
lain
te
x
t
m
es
s
ag
e
o
f
th
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
[
2
4
,
2
5
]
.
No
w
,
s
ep
ar
ate
t
h
e
p
lain
tex
t
m
es
s
ag
e
in
to
b
lo
ck
s
o
f
s
ize
f
o
u
r
c
h
ar
ac
ter
s
(
ad
d
s
p
ac
e
to
co
m
p
let
e
th
e
last
b
lo
ck
,
i
f
n
ec
es
s
ar
y
)
a
n
d
r
ep
lace
ea
ch
ch
ar
ac
ter
b
y
its
d
ec
i
m
al
A
S
C
I
I
v
al
u
e
an
d
t
ak
e
m
o
d
u
lo
9
5
f
o
r
ea
ch
v
al
u
e,
th
e
n
ar
r
an
g
e
ea
ch
b
lo
ck
in
to
f
o
u
r
r
o
w
s
co
lu
m
n
v
ec
to
r
(
1
,
2
,
3
,
…
)
an
d
m
u
ltip
l
y
th
e
s
el
f
-
in
v
er
tib
le
k
e
y
m
atr
i
x
b
y
ea
ch
v
ec
to
r
an
d
tak
e
m
o
d
u
lo
9
5
t
o
g
et
th
e
cip
h
er
tex
t
v
ec
to
r
s
(
1
,
2
,
3
,
…
)
.
A
f
ter
th
a
t,
ad
d
3
2
to
ea
ch
v
alu
e
i
n
t
h
e
cip
h
er
tex
t
v
ec
to
r
s
b
ec
au
s
e
w
e
w
o
r
k
o
n
l
y
o
n
c
h
ar
ac
ter
s
th
at
s
tar
t
f
r
o
m
t
h
e
v
al
u
e
3
2
i
n
t
h
e
ASC
I
I
tab
le.
T
h
en
r
ep
l
ac
e
ea
ch
n
u
m
er
ical
v
al
u
e
i
n
t
h
e
cip
h
er
ed
v
ec
to
r
s
w
it
h
its
co
r
r
esp
o
n
d
in
g
ch
ar
ac
t
er
f
r
o
m
t
h
e
ASC
I
I
tab
le
an
d
r
ea
r
r
an
g
e
th
e
ch
ar
ac
ter
s
i
n
a
n
e
w
m
ess
a
g
e
th
at
r
ep
r
esen
ts
th
e
cip
h
er
ed
m
es
s
a
g
e.
T
h
e
f
o
llo
w
i
n
g
ca
lc
u
latio
n
s
ar
e
r
ep
ea
ted
f
o
r
ea
ch
b
lo
ck
:
L
et
11
21
1
31
41
p
p
P
p
p
th
en
1
1
1
2
1
3
1
4
1
1
1
1
1
2
2
1
1
3
3
1
1
4
4
1
11
2
1
2
2
2
3
2
4
2
1
1
1
2
2
2
1
2
3
3
1
2
4
4
1
21
11
3
1
3
2
3
3
3
4
3
1
1
1
3
2
2
1
3
3
3
1
3
4
4
31
4
1
4
2
4
3
4
4
41
(
(
)
m
o
d
9
5
)
3
2
(
(
)
m
o
d
9
5
)
3
2
.
((
m
k
k
k
k
k
p
k
p
k
p
k
p
p
k
k
k
k
k
p
k
p
k
p
k
p
p
C
K
P
k
k
k
k
k
p
k
p
k
p
k
p
p
k
k
k
k
p
11
21
1
31
4
1
1
1
4
2
2
1
4
3
3
1
4
4
4
1
41
)
m
o
d
9
5
)
3
2
(
(
)
m
o
d
9
5
)
3
2
c
c
c
k
p
k
p
k
p
k
p
c
Dec
r
y
p
tio
n
p
r
o
ce
s
s
es
s
tar
t
w
h
en
th
e
r
ec
ip
ien
t
r
ec
eiv
e
s
th
e
c
ip
h
er
tex
t
b
y
s
ep
ar
atin
g
th
e
ci
p
h
er
tex
t
in
to
b
lo
ck
s
o
f
s
ize
f
o
u
r
ch
ar
a
cter
s
th
e
n
r
ep
lacin
g
ea
c
h
ch
ar
ac
ter
b
y
it
s
d
ec
i
m
al
ASC
I
I
v
a
lu
e
an
d
s
u
b
tr
ac
tin
g
3
2
f
r
o
m
ea
ch
v
al
u
e
an
d
ar
r
an
g
e
ea
ch
b
lo
ck
in
to
f
o
u
r
r
o
w
s
co
lu
m
n
v
ec
to
r
.
T
h
en
m
u
l
tip
li
es
th
e
s
el
f
-
i
n
v
er
tib
le
k
e
y
m
atr
i
x
b
y
ea
ch
v
ec
to
r
(
1
,
2
,
3
,
…
)
an
d
tak
es
m
o
d
u
lo
9
5
to
g
et
th
e
p
lain
tex
t
v
ec
to
r
s
(
1
,
2
,
3
,
…
)
.
Fin
all
y
,
ad
d
s
9
5
to
ea
ch
v
al
u
e
les
s
th
a
n
3
2
an
d
r
ep
lace
s
ea
ch
n
u
m
er
ical
v
al
u
e
w
it
h
its
co
r
r
esp
o
n
d
in
g
ch
ar
ac
ter
f
r
o
m
t
h
e
A
S
C
I
I
tab
le
to
g
et
th
e
o
r
ig
i
n
al
p
lain
tex
t
m
es
s
ag
e
.
5
.
1
.
T
he
pro
po
s
ed
a
pp
ro
a
ch
(
E
CCH
C
)
Step
1
:
Ke
y
Ge
n
er
atio
n
User
A
(
T
h
e
s
en
d
er
)
1
.
C
h
o
o
s
e
th
e
p
r
iv
ate
k
e
y
∈
[
1
,
−
1
]
2
.
C
o
m
p
u
te
t
h
e
p
u
b
lic
k
e
y
=
.
3
.
C
o
m
p
u
te
t
h
e
in
i
tial k
e
y
=
.
=
(
,
)
4
.
C
o
m
p
u
te
1
=
.
=
(
11
,
12
)
an
d
2
=
.
=
(
21
,
22
)
5
.
Gen
er
ate
th
e
s
el
f
-
in
v
er
tib
le
k
e
y
m
atr
i
x
m
K
User
B
(
T
h
e
r
ec
eiv
er
)
1
.
C
h
o
o
s
e
t
h
e
p
r
iv
ate
k
e
y
∈
[
1
,
−
1
]
2
.
C
o
m
p
u
te
th
e
p
u
b
lic
k
e
y
=
.
3
.
C
o
m
p
u
te
th
e
i
n
itial
k
e
y
=
.
=
(
,
)
4
.
C
o
m
p
u
te
1
=
.
=
(
11
,
12
)
an
d
2
=
.
=
(
21
,
22
)
5
.
Gen
er
ate
th
e
s
el
f
-
i
n
v
er
tib
le
k
e
y
m
atr
i
x
m
K
Step
2
:
E
n
cr
y
p
tio
n
(
U
s
er
A
)
1
.
Sep
ar
ate
th
e
p
lain
te
x
t
m
ess
a
g
e
in
to
b
lo
ck
s
o
f
s
ize
f
o
u
r
c
h
ar
ac
ter
s
.
2
.
R
ep
lace
ea
ch
ch
ar
ac
ter
b
y
it
s
d
ec
i
m
al
A
S
C
I
I
v
al
u
e
an
d
tak
e
m
o
d
u
lo
9
5
f
o
r
ea
ch
v
alu
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
n
ew h
yb
r
id
text
en
cryp
tio
n
a
p
p
r
o
a
c
h
o
ve
r
mo
b
ile
a
d
h
o
c
n
etw
o
r
k
(
Mo
h
a
mme
d
A
min
A
l
ma
ia
h
)
6467
3
.
A
r
r
an
g
e
ea
ch
b
lo
ck
i
n
to
f
o
u
r
r
o
w
s
co
l
u
m
n
v
ec
to
r
(
41
).
4
.
Mu
ltip
l
y
t
h
e
s
el
f
-
i
n
v
er
tib
le
k
e
y
m
atr
ix
b
y
ea
c
h
v
ec
to
r
(
1
,
2
,
3
,
…
)
an
d
tak
e
m
o
d
u
lo
9
5
f
o
r
ea
ch
v
al
u
e
11
(
.
)
m
o
d
9
5
m
C
K
P
5
.
A
d
d
3
2
to
ea
ch
v
alu
e
i
n
th
e
ci
p
h
er
tex
t
v
ec
to
r
s
(
1
,
2
,
3
,
…
)
.
6
.
R
ep
lace
ea
ch
n
u
m
er
ical
v
a
lu
e
w
it
h
it
s
co
r
r
es
p
o
n
d
in
g
c
h
ar
ac
t
er
f
r
o
m
th
e
ASC
I
I
tab
le.
7
.
T
h
e
r
esu
ltin
g
te
x
t f
o
r
m
s
t
h
e
ci
p
h
er
tex
t
m
es
s
ag
e
.
Step
3
:
Dec
r
y
p
tio
n
(
User
B
)
1
.
Sep
ar
ate
th
e
cip
h
er
tex
t
m
e
s
s
a
g
e
in
to
b
lo
ck
s
o
f
s
ize
f
o
u
r
ch
ar
ac
ter
s
.
2
.
R
ep
lace
ea
ch
ch
ar
ac
ter
b
y
it
s
d
ec
i
m
al
A
S
C
I
I
v
al
u
e.
3
.
Su
b
tr
ac
t 3
2
f
r
o
m
ea
ch
v
al
u
e
i
n
th
e
cip
h
er
tex
t b
lo
ck
s
.
4
.
A
r
r
an
g
e
ea
ch
b
lo
ck
i
n
to
f
o
u
r
r
o
w
s
co
l
u
m
n
v
ec
to
r
.
5
.
Mu
ltip
l
y
th
e
s
el
f
-
i
n
v
er
tib
le
k
e
y
m
atr
i
x
b
y
ea
c
h
v
ec
to
r
(
1
,
2
,
3
,
…
)
an
d
tak
e
m
o
d
u
lo
9
5
f
o
r
ea
ch
v
al
u
e
11
(
.
)
m
o
d
9
5
m
P
K
C
6
.
A
d
d
9
5
to
ea
ch
v
alu
e
i
n
s
tep
5
less
t
h
an
3
2
.
7
.
R
ep
lace
ea
ch
n
u
m
er
ical
v
alu
e
in
th
e
v
ec
to
r
s
(
1
,
2
,
3
,
…
)
b
y
its
ASC
I
I
tab
le
co
r
r
esp
o
n
d
in
g
ch
ar
ac
ter
.
8
.
T
h
e
r
esu
ltin
g
te
x
t f
o
r
m
s
t
h
e
d
ec
r
y
p
ted
m
ess
a
g
e
.
6.
E
XP
E
R
I
M
E
NT
A
L
RE
SUL
T
S AN
D
A
NALY
SI
S
A
s
s
u
m
e
th
at
U
s
e
r
A
w
an
t
s
t
o
s
en
d
t
h
e
m
es
s
a
g
e
t
o
U
s
e
r
B
a
n
d
t
h
ey
a
g
r
e
e
d
t
o
u
s
e
th
e
e
ll
i
p
t
i
c
c
u
r
v
e
f
u
n
c
t
i
o
n
:
2
≡
3
+
+
3
(
31
)
w
h
er
e
=
1
,
=
3
,
=
31
;
w
h
ich
s
ati
s
f
ies
t
h
e
co
n
d
itio
n
4
3
+
27
2
=
4
(
1
)
3
+2
7
(
3
)
2
=
4
+2
4
3
=
2
4
7
mo
d
3
1
=
3
0
0
.
T
h
e
ellip
tic
cu
r
v
e
31
(
1
,
3
)
p
o
in
ts
ar
e
s
h
o
w
n
i
n
T
ab
le
1
[
1
6
,
18
].
T
ab
le
1.
T
h
e
p
o
in
ts
o
f
th
e
elli
p
tic
cu
r
v
e
:
2
≡
3
+
+
3
(
31
)
(
1
,
6
)
(
6
,
1
5
)
(
1
5
,
1
3
)
(
2
1
,
4
)
(
2
6
,
1
1
)
(
1
,
2
5
)
(
6
,
1
6
)
(
1
5
,
1
8
)
(
2
1
,
2
7
)
(
2
6
,
2
0)
(
3
,
8
)
(
9
,
1
1
)
(
1
7
,
2
)
(
2
2
,
3
)
(
2
7
,
1
1
)
(
3
,
2
3
)
(
9
,
2
0
)
(
1
7
,
2
9
)
(
2
2
,
2
8
)
(
2
7
,
2
0
)
(
4
,
3
)
(
1
2
,
1
0
)
(
1
8
,
5
)
(
2
3
,
1
4
)
(
2
8
,
2
)
(
4
,
2
8
)
(
1
2
,
2
1
)
(
1
8
,
2
6
)
(
2
3
,
1
7
)
(
2
8
,
2
9
)
(
5
,
3
)
(
1
4
,
8
)
(
2
0
,
5
)
(
2
4
,
5
)
(
3
0
,
1
)
(
5
,
2
8
)
(
1
4
,
2
3
)
(
2
0
,
2
6
)
(
2
4
,
2
6
)
(
3
0
,
3
0
)
Sin
ce
t
h
e
o
r
d
er
o
f
th
e
ellip
tic
cu
r
v
e
31
(
1
,
3
)
is
4
1
,
w
h
ich
i
s
a
p
r
i
m
e
n
u
m
b
er
,
an
y
p
o
in
t
f
r
o
m
T
ab
le
1
ca
n
b
e
ch
o
s
en
to
r
ep
r
esen
t
th
e
b
ase
p
o
in
t
o
r
g
en
er
ato
r
p
o
in
t
.
So
,
if
w
e
ch
o
o
s
e
=
(
1
,
6
)
,
th
e
d
o
m
ai
n
p
ar
a
m
eter
s
f
o
r
ar
e
{
,
,
,
}
=
{
1
,
3
,
31
,
(
1
,
6
)
}
.
I
f
User
A
w
a
n
t
s
to
s
e
n
d
th
e
p
lai
n
tex
t
m
es
s
ag
e
=
“
Hi,
o
u
r
m
ee
ti
n
g
at
1
0
Am
”
to
User
B
.
B
o
th
s
en
d
er
an
d
r
ec
eiv
er
s
h
o
u
ld
ap
p
l
y
th
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
(
E
C
C
HC
)
o
n
th
e
m
e
s
s
a
g
e
as f
o
llo
w
s
:
6
.
1
.
T
he
pro
po
s
ed
a
pp
ro
a
ch
(
E
CCH
C
)
Step
1
:
Ke
y
Ge
n
er
atio
n
User
A
1.
C
h
o
o
s
e
t
h
e
p
r
iv
ate
k
e
y
=
13
∈
[
1
,
30
]
2.
C
o
m
p
u
te
th
e
p
u
b
lic
k
e
y
=
.
=
13
(
1
,
6
)
=
(
3
,
23
)
3.
C
o
m
p
u
te
th
e
i
n
itial
k
e
y
=
.
=
13
(
24
,
5
)
=
(
20
,
5
)
=
(
,
)
4.
C
o
m
p
u
te
1
=
.
=
20
(
1
,
6
)
=
(
4
,
28
)
=
(
11
,
12
)
an
d
2
=
.
=
5
(
1
,
6
)
=
(
15
,
18
)
=
(
21
,
22
)
5.
Ass
u
m
e
th
at
11
4
28
15
18
K
,
th
en
t
h
e
s
el
f
-
i
n
v
er
tib
le
k
e
y
m
atr
ix
4
28
92
67
15
18
80
78
5
28
91
67
15
19
80
77
m
K
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
6
4
6
1
-
6
4
7
1
6468
U
s
er
B
1.
C
h
o
o
s
e
t
h
e
p
r
iv
ate
k
e
y
=
17
∈
[
1
,
30
]
2.
C
o
m
p
u
te
th
e
p
u
b
lic
k
e
y
=
.
=
17
(
1
,
6
)
=
(
24
,
5
)
3.
C
o
m
p
u
te
th
e
i
n
itial
k
e
y
=
.
=
17
(
3
,
23
)
=
(
20
,
5
)
=
(
,
)
4.
C
o
m
p
u
te
1
=
.
=
20
(
1
,
6
)
=
(
4
,
28
)
=
(
11
,
12
)
an
d
2
=
.
=
5
(
1
,
6
)
=
(
15
,
18
)
=
(
21
,
22
)
5.
A
ss
um
e t
hat
11
4
28
15
18
K
,
t
he
n t
h
e s
e
l
f
-
i
nv
er
t
i
bl
e k
ey
m
at
r
i
x
4
28
92
67
15
18
80
78
5
28
91
67
15
19
80
77
m
K
Step
2
:
E
n
cr
y
p
tio
n
(
U
s
er
A
)
1.
=
(
Hi,
)(
o
u
r
)(
m
ee
t
)(
in
g
)(
at
1
)(
0
Am
)
2.
T
h
e
A
S
C
I
I
v
alu
e
s
f
o
r
=
(
72
105
44
32
)
(
111
117
114
32
)
(
109
101
101
116
)
(
105
110
103
32
)
(
97
116
32
49
)
(
48
32
65
109
)
an
d
af
ter
tak
in
g
m
o
d
u
lo
9
5
,
it
w
il
l b
e
=
(
72
1
0
44
32
)
(
16
22
19
32
)
(
14
6
6
21
)
(
10
15
8
32
)
(
2
21
32
49
)
(
48
32
65
14
)
3.
1
72
10
44
32
P
,
2
16
22
19
32
P
,
3
14
6
6
21
P
,
4
10
15
8
32
P
,
5
2
21
32
49
P
,
an
d
6
48
32
65
14
P
4.
T
h
e
m
u
ltip
li
ca
tio
n
o
f
b
y
th
e
f
ir
s
t
v
ec
to
r
1
w
ill
b
e
d
o
n
e,
an
d
th
e
s
a
m
e
p
r
o
ce
s
s
w
i
ll
b
e
r
ep
ea
ted
f
o
r
th
e
o
th
er
v
ec
to
r
s
.
11
.
m
C
K
P
4
28
92
67
15
18
80
78
5
28
91
67
15
19
80
77
72
10
44
32
m
o
d
9
5
15
56
43
34
5.
A
d
d
3
2
to
ea
ch
v
alu
e
i
n
1
C
1
C
47
88
75
66
6.
Fro
m
th
e
ASC
I
I
tab
le
1
C
/XKB
Af
ter
r
ep
ea
ti
n
g
s
tep
s
4
,
5
,
a
n
d
6
f
o
r
t
h
e
v
ec
to
r
s
2345
,
,
,
,
P
P
P
P
an
d
6
P
,
th
e
ci
p
h
er
tex
t
m
e
s
s
a
g
e
t
h
a
t
w
il
l b
e
s
en
t to
u
s
er
B
is
=
/XKB
,
1
)
r
}
]
&
N/I
1
8
n
MP
1
:s
)
&
Step
3
:
Dec
r
y
p
tio
n
(
User
B
)
1.
=
(
/XKB
)
(
,
1
)
r
)
(
}]
&
N
)
(
/I
1
8
)
(
n
MP
1
)
(
:s
)
&
)
2.
T
h
e
A
S
C
I
I
v
alu
e
s
f
o
r
=
(
47
88
75
66
)
(
44
124
41
114
)
(
125
93
38
78
)
(
47
73
49
56
)
(
110
77
80
49
)
(
58
115
41
38
)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
n
ew h
yb
r
id
text
en
cryp
tio
n
a
p
p
r
o
a
c
h
o
ve
r
mo
b
ile
a
d
h
o
c
n
etw
o
r
k
(
Mo
h
a
mme
d
A
min
A
l
ma
ia
h
)
6469
3.
Su
b
tr
ac
t 3
2
f
r
o
m
ea
ch
v
al
u
e
i
n
t
h
e
cip
h
er
tex
t
v
ec
to
r
s
=
(
15
56
43
34
)
(
12
92
9
82
)
(
93
61
6
46
)
(
15
41
17
24
)
(
78
45
48
17
)
(
26
83
9
6
)
4.
1
15
56
43
34
C
,
2
12
92
9
82
C
,
3
93
61
6
46
C
,
4
15
41
17
24
C
,
5
78
45
48
17
C
,
an
d
6
26
83
9
6
C
5.
T
h
e
m
u
ltip
licatio
n
o
f
b
y
t
h
e
f
ir
s
t
v
ec
to
r
1
w
ill
b
e
d
o
n
e,
an
d
th
e
s
a
m
e
p
r
o
ce
s
s
w
ill
b
e
r
ep
ea
ted
f
o
r
th
e
o
th
er
v
ec
to
r
s
.
11
.
m
P
K
C
4
28
92
67
15
18
80
78
5
28
91
67
15
19
80
77
15
56
43
34
m
o
d
9
5
72
10
44
32
6.
A
d
d
9
5
to
ea
ch
v
alu
e
i
n
s
tep
5
less
t
h
an
3
2
1
72
105
44
32
P
7.
Fro
m
th
e
ASC
I
I
tab
le
1
P
Hi,
.
Af
ter
r
ep
ea
tin
g
s
tep
s
5
,
6
,
an
d
7
f
o
r
th
e
v
ec
to
r
s
2345
,
,
,
,
C
C
C
C
an
d
6
C
,
th
e
d
ec
r
y
p
ted
m
e
s
s
a
g
e
t
h
at
w
il
l b
e
r
esu
lted
is
=
Hi,
o
u
r
m
e
etin
g
at
1
0
Am
.
7.
CO
NCLU
SI
O
N
I
n
f
o
r
m
a
tio
n
s
ec
u
r
it
y
is
o
n
e
o
f
th
e
m
o
s
t
i
m
p
o
r
ta
n
t
is
s
u
es
i
n
th
e
r
ec
e
n
t
ti
m
es.
E
ll
ip
tic
cu
r
v
e
cr
y
p
to
g
r
ap
h
y
(
E
C
C
)
i
s
o
n
e
o
f
th
e
m
o
s
t
e
f
f
icie
n
t
p
u
b
lic
k
e
y
cr
y
p
to
s
y
s
te
m
s
t
h
at
i
s
s
ec
u
r
ed
ag
ain
s
t
ad
v
er
s
ar
ies
b
ec
au
s
e
it
is
h
ar
d
f
o
r
th
e
m
t
o
f
in
d
th
e
s
ec
r
et
k
e
y
a
n
d
s
o
l
v
e
th
e
ell
ip
tic
cu
r
v
e
d
is
cr
ete
lo
g
ar
ith
m
p
r
o
b
le
m
.
I
t’
s
s
tr
en
g
t
h
en
ed
s
ec
u
r
it
y
al
s
o
co
m
es
f
r
o
m
th
e
s
m
all
k
e
y
s
i
ze
th
at
i
s
u
s
ed
i
n
it
w
it
h
t
h
e
s
a
m
e
le
v
el
o
f
s
a
f
et
y
co
m
p
ar
ed
to
th
e
o
th
er
cr
y
p
to
s
y
s
te
m
s
l
ik
e
R
S
A
.
A
n
e
w
ap
p
r
o
ac
h
cr
y
p
to
s
y
s
te
m
(
E
C
C
HC
)
h
as
b
ee
n
p
r
o
p
o
s
ed
i
n
t
h
is
p
ap
er
co
m
b
i
n
in
g
E
C
C
w
i
t
h
s
tan
d
ar
d
Hill
cip
h
er
alg
o
r
it
h
m
to
e
n
h
a
n
ce
a
n
d
in
cr
ea
s
e
th
e
s
ec
u
r
it
y
o
f
th
e
o
r
ig
i
n
al
Hil
l
cip
h
er
.
I
t
g
e
n
er
ates
a
n
e
w
e
n
cr
y
p
tio
n
/d
ec
r
y
p
tio
n
k
e
y
b
y
u
s
i
n
g
E
C
C
ap
p
r
o
ac
h
w
h
ic
h
p
r
o
d
u
ce
s
a
s
tr
o
n
g
s
ec
r
et
k
e
y
t
h
at
r
esis
tan
t
ag
ain
s
t
in
tr
u
d
er
s
a
n
d
p
r
o
v
id
es
b
etter
s
ec
u
r
it
y
b
ec
au
s
e
n
o
n
ee
d
to
s
h
ar
e
t
h
e
k
e
y
t
h
r
o
u
g
h
t
h
e
i
n
ter
n
et.
Self
-
i
n
v
er
t
ib
le
k
e
y
m
atr
i
x
is
u
s
ed
f
o
r
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
.
So
,
n
o
n
ee
d
to
f
in
d
th
e
in
v
er
s
e
k
e
y
m
atr
i
x
i
n
th
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
.
T
h
e
ab
ilit
y
to
e
n
cr
y
p
t
ev
er
y
c
h
ar
ac
ter
in
th
e
1
2
8
A
S
C
I
I
tab
l
e
d
ir
ec
tl
y
w
i
th
o
u
t
m
ap
p
in
g
tab
le
is
a
n
e
w
co
n
tr
ib
u
tio
n
i
n
t
h
is
ap
p
r
o
ac
h
b
ec
au
s
e
o
th
er
m
et
h
o
d
s
u
s
ed
o
n
l
y
t
h
e
alp
h
ab
et
s
(
a,
b
,
c,
…,
z)
a
n
d
n
ee
d
m
ap
p
i
n
g
tab
le.
Ot
h
er
w
i
s
e,
t
h
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
ca
n
b
e
u
s
ed
ef
f
i
cien
tl
y
i
n
r
ea
l
-
ti
m
e
m
u
lti
m
ed
ia
an
d
w
ir
eles
s
ap
p
licatio
n
s
a
n
d
s
u
i
tab
le
f
o
r
s
m
a
l
l
d
ev
ices
an
d
e
m
b
ed
d
ed
s
y
s
t
e
m
s
b
ec
au
s
e
it
h
a
s
a
s
i
m
p
le
s
tr
u
ct
u
r
e
an
d
f
a
s
ter
co
m
p
u
tatio
n
s
a
n
d
ca
n
b
e
ap
p
lied
on
tex
t,
i
m
a
g
e,
au
d
io
,
an
d
v
i
d
eo
.
RE
F
E
R
E
NC
E
S
[1
]
H.
Da
rre
l,
e
t
a
l.
,
“
G
u
id
e
to
e
ll
ip
ti
c
c
u
rv
e
c
r
y
p
to
g
ra
p
h
y
,”
S
p
rin
g
e
r
-
Ver
la
g
Pr
o
fes
sio
n
a
l
C
o
mp
u
ti
n
g
S
e
rie
s
,
p
p
.
1
-
3
1
1
,
2
0
0
4
.
[2
]
M
.
U.
Bo
k
h
a
ri
a
n
d
Q.
M
.
S
h
a
ll
a
l,
“
A
Re
v
ie
w
o
n
S
y
m
m
e
tri
c
Ke
y
En
c
r
y
p
ti
o
n
T
e
c
h
n
iq
u
e
s
in
Cr
y
p
to
g
ra
p
h
y
,”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
C
o
mp
u
ter
Ap
p
l
ica
ti
o
n
s
,
v
o
l.
1
4
7
,
n
o
.
1
0
,
p
p
.
4
3
-
4
8
,
2
0
1
6
.
[3
]
W.
Di
ff
ie
a
n
d
M
.
He
ll
m
a
n
,
“
Ne
w
d
irec
ti
o
n
s
in
c
r
y
p
to
g
ra
p
h
y
,”
IEE
E
tra
n
sa
c
ti
o
n
s
o
n
In
fo
rm
a
ti
o
n
T
h
e
o
ry
,
v
o
l.
2
2
,
n
o
.
6
,
p
p
.
6
4
4
-
6
5
4
,
1
9
7
6
.
[4
]
V
.
S
.
M
i
ll
e
r,
“
Us
e
o
f
e
ll
ip
ti
c
c
u
rv
e
s
in
c
r
y
p
to
g
r
a
p
h
y
,”
i
n
C
o
n
fer
e
n
c
e
o
n
th
e
T
h
e
o
ry
a
n
d
Ap
p
li
c
a
ti
o
n
o
f
Cry
p
to
g
ra
p
h
ic T
e
c
h
n
i
q
u
e
s
,
p
p
.
4
1
7
-
4
2
6
,
1
9
8
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
6
4
6
1
-
6
4
7
1
6470
[5
]
N.
Ko
b
li
tz,
“
El
li
p
ti
c
c
u
rv
e
c
ry
p
to
s
y
ste
m
s,
”
M
a
th
e
ma
ti
c
s o
f
C
o
mp
u
ta
ti
o
n
,
v
o
l.
48
,
n
o
.
1
7
7
,
pp.
2
0
3
-
2
0
9
,
1
9
8
7
.
[6
]
B.
K.
A
les
e
,
e
t
a
l.
,
“
Co
m
p
a
ra
ti
v
e
a
n
a
ly
sis
o
f
p
u
b
li
c
-
k
e
y
e
n
c
r
y
p
ti
o
n
sc
h
e
m
e
s
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
En
g
i
n
e
e
rin
g
a
n
d
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
2
,
n
o
.
9,
p
p
.
1
5
5
2
-
1
5
6
8
,
2
0
1
2
.
[7
]
K.
Ra
jad
u
rg
a
a
n
d
S
.
R.
K
u
m
a
r
,
“
G
F
(2
m
)
b
a
se
d
lo
w
c
o
m
p
le
x
it
y
m
u
lt
ip
li
e
r
f
o
r
e
ll
ip
ti
c
c
u
rv
e
c
r
y
p
to
g
ra
p
h
y
s
y
ste
m
s
,”
Ne
two
rk
in
g
a
n
d
Co
mm
u
n
ica
ti
o
n
E
n
g
i
n
e
e
rin
g
,
v
o
l.
6
,
n
o
.
4,
pp.
1
5
0
-
1
5
5
,
2
0
1
4
.
[8
]
I.
A
.
Is
m
a
il
,
e
t
a
l.
,
“
Ho
w
to
re
p
a
ir
th
e
Hill
c
ip
h
e
r
,”
J
o
u
r
n
a
l
o
f
Z
h
e
ji
a
n
g
U
n
ive
rs
it
y
S
CIENCE
A
,
v
o
l.
7
,
n
o
.
1
2
,
p
p
.
2
0
2
2
-
2
0
3
0
,
2
0
0
6
.
[9
]
B.
A
c
h
a
r
y
a
,
e
t
a
l.
,
“
I
m
a
g
e
e
n
c
ry
p
ti
o
n
u
sin
g
a
d
v
a
n
c
e
d
h
il
l
c
i
p
h
e
r
a
lg
o
rit
h
m
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Rec
e
n
t
T
re
n
d
s i
n
En
g
i
n
e
e
rin
g
,
v
o
l.
1
,
n
o
.
1
,
p
p
.
6
6
3
-
6
6
7
,
2
0
0
9
.
[1
0
]
G.
Ha
m
issa
,
e
t
a
l.
,
“
S
e
c
u
rin
g
JP
EG
a
rc
h
it
e
c
tu
re
b
a
se
d
o
n
e
n
h
a
n
c
e
d
c
h
a
o
ti
c
h
il
l
c
ip
h
e
r
a
lg
o
rit
h
m
,”
i
n
2
0
1
1
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
C
o
mp
u
ter
E
n
g
i
n
e
e
rin
g
&
S
y
ste
ms
(
IC
CES
),
p
p
.
2
6
0
-
2
6
6
,
2
0
1
1
.
[1
1
]
M
.
N.
A
.
Ra
h
m
a
n
,
e
t
a
l.
,
“
Cry
p
to
g
ra
p
h
y
:
A
Ne
w
A
p
p
ro
a
c
h
o
f
Clas
sic
a
l
Hill
Cip
h
e
r
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
S
e
c
u
rity a
n
d
Its
Ap
p
li
c
a
t
io
n
s
,
v
o
l.
7
,
n
o
.
2,
p
p
.
1
7
9
-
1
9
0
,
2
0
1
3
.
[1
2
]
K.
A
g
r
a
w
a
l
a
n
d
A
.
G
e
r
a
,
“
El
li
p
ti
c
C
u
rv
e
Cry
p
to
g
ra
p
h
y
w
i
th
Hill
Cip
h
e
r
G
e
n
e
ra
ti
o
n
f
o
r
S
e
c
u
re
T
e
x
t
Cr
y
p
to
sy
ste
m
,”
In
ter
n
a
ti
o
n
a
l
j
o
u
rn
a
l
o
f
c
o
m
p
u
ter
a
p
p
li
c
a
ti
o
n
s
,
v
o
l.
1
0
6
,
n
o
.
1
,
p
p
.
1
8
-
2
4
,
2
0
1
4
.
[1
3
]
N.
S
h
a
rm
a
a
n
d
S
.
Ch
irg
a
i
y
a
,
“
A
No
v
e
l
A
p
p
ro
a
c
h
to
Hill
Cip
h
e
r
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
mp
u
ter
Ap
p
li
c
a
ti
ons
,
v
o
l
.
1
0
8
,
n
o
.
11
,
p
p
.
3
4
-
3
7
,
2
0
1
4
.
[1
4
]
A.
M
a
h
m
o
u
d
a
n
d
A
.
Ch
e
f
ra
n
o
v
,
“
Hill
c
ip
h
e
r
m
o
d
if
ica
ti
o
n
b
a
se
d
o
n
p
se
u
d
o
-
ra
n
d
o
m
e
ig
e
n
v
a
lu
e
s
,”
Ap
p
l
ie
d
M
a
th
e
ma
ti
c
s a
n
d
In
f
o
rm
a
ti
o
n
S
c
i
e
n
c
e
s
,
v
o
l.
8
,
n
o
.
2
,
p
p
.
5
0
5
-
5
1
6
,
2
0
1
4
.
[1
5
]
A.
R
a
m
e
sh
,
“
En
h
a
n
c
in
g
th
e
S
e
c
u
rit
y
o
f
Hill
C
ip
h
e
r
u
sin
g
Co
lu
m
n
a
r
T
ra
n
sp
o
siti
o
n
,”
i
n
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
En
g
i
n
e
e
rin
g
Res
e
a
rc
h
a
n
d
T
e
c
h
n
o
lo
g
y
,
v
o
l.
4
,
n
o
.
0
7
,
p
p
.
7
4
1
-
7
4
4
,
2
0
1
5
.
[1
6
]
Z.
E.
Da
wa
h
d
e
h
,
e
t
a
l.
,
“
A
n
e
w
i
m
a
g
e
e
n
c
r
y
p
ti
o
n
tec
h
n
iq
u
e
c
o
m
b
in
in
g
El
li
p
ti
c
Cu
rv
e
Cr
y
p
to
sy
ste
m
w
it
h
Hill
Cip
h
e
r
,”
J
o
u
rn
a
l
o
f
Ki
n
g
S
a
u
d
Un
ive
rs
it
y
-
Co
mp
u
ter
a
n
d
In
f
o
rm
a
ti
o
n
S
c
ien
c
e
s
,
v
o
l.
3
0
,
n
o
.
3,
pp.
349
-
3
5
5
,
2
0
1
8
.
[1
7
]
J.
Ho
f
f
st
e
in
,
e
t
a
l.
,
“
El
li
p
t
ic
C
u
rv
e
s
a
n
d
Cry
p
to
g
ra
p
h
y
,”
i
n
An
In
tro
d
u
c
ti
o
n
to
M
a
th
e
ma
t
ica
l
Cry
p
to
g
ra
p
h
y
,
p
p
.
2
9
9
-
371
,
2
0
1
4
.
[1
8
]
Z.
E.
Da
w
a
h
d
e
h
,
e
t
a
l.
,
“
A
Ne
w
M
o
d
if
ica
ti
o
n
f
o
r
M
e
n
e
z
e
s
-
V
a
n
st
o
n
e
El
l
ip
ti
c
Cu
rv
e
Cry
p
to
s
y
st
e
m
,”
J
o
u
rn
a
l
o
f
T
h
e
o
re
ti
c
a
l
a
n
d
A
p
p
li
e
d
I
n
fo
rm
a
t
io
n
T
e
c
h
n
o
lo
g
y
,
v
o
l.
85
,
n
o
.
3
,
p
p
.
2
9
0
-
2
9
7
,
2
0
1
6
.
[1
9
]
B
.
Na
y
a
k
,
“
S
ig
n
c
r
y
p
ti
o
n
sc
h
e
m
e
s
b
a
se
d
o
n
e
ll
ip
t
ic
c
u
rv
e
c
ry
p
t
o
g
ra
p
h
y
,
”
M
a
ste
r
T
h
e
sis,
Na
ti
o
n
a
l
In
stit
u
te
o
f
T
e
c
h
n
o
lo
g
y
Ro
u
rk
e
la,
In
d
ia
,
2
0
1
4
.
[2
0
]
M
.
N.
Ud
in
,
e
t
a
l.
,
“
A
p
p
li
c
a
ti
o
n
o
f
m
e
ss
a
g
e
e
m
b
e
d
d
in
g
tec
h
n
iq
u
e
in
El
G
a
m
a
l
e
ll
ip
ti
c
c
u
rv
e
c
r
y
p
to
s
y
ste
m
,”
i
n
2
0
1
2
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
S
ta
t
i
stics
in
S
c
ien
c
e
,
B
u
sin
e
ss
,
a
n
d
E
n
g
in
e
e
rin
g
(
ICS
S
BE
),
p
p
.
1
-
6
,
2
0
1
2
.
[2
1
]
L
.
S
.
Hill
,
“
Cry
p
to
g
ra
p
h
y
in
a
n
a
lg
e
b
ra
ic
a
lp
h
a
b
e
t
,”
T
h
e
Ame
ric
a
n
M
a
t
h
e
ma
ti
c
a
l
M
o
n
t
h
ly
,
v
o
l.
3
6
,
n
o
.
6,
pp.
3
0
6
-
312
,
1
9
2
9
.
[2
2
]
B.
A
c
h
a
r
y
a
,
e
t
a
l.
,
“
No
v
e
l
m
e
th
o
d
s
o
f
g
e
n
e
ra
ti
n
g
se
l
f
-
in
v
e
rti
b
le
m
a
tri
x
f
o
r
h
il
l
c
i
p
h
e
r
a
lg
o
ri
th
m
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
S
e
c
u
rity
,
v
ol
.
1
,
no.
1
,
p
p
.
1
4
-
2
1
,
2
0
0
7
.
[2
3
]
P
.
G
.
M
a
n
te,
e
t
a
l.
,
“
A
S
y
m
m
e
tri
c
a
l
En
c
ry
p
ti
o
n
T
e
c
h
n
iq
u
e
f
o
r
T
e
x
t
En
c
ry
p
ti
o
n
Us
in
g
Ra
n
d
o
m
i
z
e
d
M
a
tri
x
Ba
se
d
Ke
y
G
e
n
e
ra
ti
o
n
,”
i
n
A
d
v
a
n
c
e
s in
Da
ta
S
c
ien
c
e
a
n
d
M
a
n
a
g
e
me
n
t
,
p
p
.
1
3
7
-
1
4
8
,
2
0
2
0
.
[2
4
]
M
.
A
.
Na
ji
,
e
t
a
l.
,
“
Cry
p
tan
a
ly
sis
c
ip
h
e
r
tex
t
u
sin
g
n
e
w
m
o
d
e
li
n
g
:
T
e
x
t
e
n
c
r
y
p
ti
o
n
u
s
in
g
e
ll
ip
ti
c
c
u
rv
e
c
r
y
p
to
g
ra
p
h
y
,”
i
n
AIP
Co
n
fer
e
n
c
e
Pro
c
e
e
d
in
g
s
,
v
o
l.
2
2
0
3
,
n
o
.
1
,
2
0
2
0
.
[2
5
]
R.
A
n
a
n
d
k
u
m
a
r
a
n
d
R.
Ka
lp
a
n
a
,
“
A
S
u
rv
e
y
o
n
Ch
a
o
s Ba
se
d
En
c
ry
p
ti
o
n
T
e
c
h
n
iq
u
e
,”
i
n
E
n
a
b
li
n
g
T
e
c
h
n
o
l
o
g
ies
a
n
d
Arc
h
it
e
c
tu
re
s fo
r Ne
x
t
-
Ge
n
e
ra
ti
o
n
Ne
two
rk
in
g
Ca
p
a
b
il
i
ti
e
s
,
p
p
.
1
4
7
-
1
6
5
,
2
0
1
9
.
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
M
o
h
a
m
m
e
d
A
m
i
n
Al
m
a
i
a
h
r
e
c
e
iv
e
d
h
is
P
h
D
in
C
o
m
p
u
ter
S
c
ien
c
e
f
ro
m
Un
iv
e
rsit
y
M
a
la
y
sia
T
e
re
n
g
g
a
n
u
f
ro
m
M
a
la
y
sia
.
M
S
c
in
Co
m
p
u
ter
In
f
o
rm
a
t
io
n
S
y
ste
m
f
ro
m
M
i
d
d
le
Eas
t
Un
iv
e
rsity
(M
EU)
in
2
0
1
1
f
ro
m
Jo
rd
a
n
.
He
is
n
o
w
w
o
rk
in
g
a
s
A
ss
ist
a
n
t
P
ro
f
e
ss
o
r
in
th
e
De
p
a
rtme
n
t
o
f
CIS
a
t
Kin
g
F
a
isa
l
S
a
u
d
i
A
ra
b
ia.
He
h
a
s
p
u
b
li
s
h
e
d
o
v
e
r
1
5
re
se
a
rc
h
p
a
p
e
rs
in
h
ig
h
ly
re
p
u
ted
jo
u
rn
a
ls
su
c
h
a
s
th
e
En
g
in
e
e
rin
g
a
n
d
S
c
ien
c
e
T
e
c
h
n
o
l
o
g
y,
a
n
In
tern
a
ti
o
n
a
l
Jo
u
r
n
a
l,
Ed
u
c
a
ti
o
n
a
n
d
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
ies
,
th
e
Jo
u
r
n
a
l
o
f
Ed
u
c
a
ti
o
n
a
l
Co
m
p
u
ti
n
g
Re
se
a
r
c
h
a
n
d
o
t
h
e
rs.
M
o
st
o
f
h
is
p
u
b
l
ica
ti
o
n
s
w
e
re
in
d
e
x
e
d
u
n
d
e
r
th
e
IS
I
W
e
b
o
f
S
c
ien
c
e
a
n
d
S
c
o
p
u
s.
His
c
u
rre
n
t
re
se
a
rc
h
in
tere
st
s
in
c
lu
d
e
m
o
b
il
e
lea
r
n
in
g
,
so
f
t
w
a
re
q
u
a
li
t
y
,
n
e
tw
o
rk
s
e
c
u
rit
y
a
n
d
tec
h
n
o
l
o
g
y
a
c
c
e
p
tan
c
e
.
He
is
a
c
e
rti
f
ied
re
c
o
g
n
ize
d
Re
v
ie
w
e
r
b
y
se
v
e
ra
l
lea
d
in
g
jo
u
r
n
a
ls i
n
I
EE
E,
El
se
v
ier an
d
S
p
rin
g
e
r.
Z
ia
d
D
a
w
a
h
d
e
h
,
S
c
h
o
o
l
o
f
Co
m
p
u
ter
a
n
d
Co
m
m
u
n
ica
ti
o
n
En
g
in
e
e
rin
g
,
Un
i
M
A
P
Un
iv
e
rsit
y
,
P
e
rli
s,
M
a
lay
sia
.
Evaluation Warning : The document was created with Spire.PDF for Python.