A cross-border community for researchers with openness, equality and inclusion
Mathematical modeling for cryptography using Mayan technique
ID:147 View protection:Participant Only Updated time:2025-12-23 13:18:53 Views:91 In-person

Start Time:2025-12-30 11:00

Duration:15min

Session:[S6] Special Track 1 : Mathematical Modeling for Electrical and Electronic Engineering: Theory, Methods, and Applications [S6] Special Track 1 : Mathematical Modeling for Electrical and Electronic Engineering: Theory, Methods, and Applications

No file yet

Abstract
Data protection is explaining a huge trade in the modern era; the wide communication expansion designed for this area increased attention from all sorts of sides (friends and foes); integral techniques have perfected a decent role in several approaches that are suggested to be applied in the cryptography area.  In this article, the Mayan integral technique has been applied as an aspect of a symmetric key system via implementing a practical example in encryption and decryption; the Mayan integral transform has shown its capability to be invested in cryptography and in the data security area in general.

Keywords
Mayan integral transform,Cryptosystem,Symmetric key system,Asymmetric key system,cybercrime,transparent institutions
Speaker
Nour K Salman
Mustansiriyah University

Post comments
Verification Code Change Another
All comments
Important Dates
  • Conference date

    12-29

    2025

    -

    12-31

    2025

  • 12-30 2025

    Presentation submission deadline

  • 02-10 2026

    Draft paper submission deadline

  • 02-10 2026

    Registration deadline

Sponsored By

United Societies of Science

Organized By

扎尔卡大学

Contact info
×

USS WeChat Official Account

USSsociety

Please scan the QR code to follow
the wechat official account.