Show simple item record

dc.contributor.authorPrihandoko, Antonius Cahya
dc.contributor.authorDafik, Dafik
dc.contributor.authorAgustin, Ika Hesti
dc.contributor.authorD. Susanto
dc.contributor.authorSlamin, Slamin
dc.date.accessioned2018-04-30T04:26:31Z
dc.date.available2018-04-30T04:26:31Z
dc.date.issued2018-04-30
dc.identifier.isbn978-602-74668-0-7
dc.identifier.urihttp://repository.unej.ac.id/handle/123456789/85639
dc.descriptionProgram & Abstracts Book AMC 2016 (The Asian Mathematical Conference)en_US
dc.description.abstractThe strength of cryptosystem relays on the management of encryption key. The key should be managed such that it is hard for any intruder to analyze the key. Thus, the main issue is how to make the relation between plaintext, ciphertext and the key is hidden. This paper will study the use of super (a, d)-H antimagic total graph in developing an encryption key to achieve the security. Let H be a simple, connected and undirected graph. A graph G = (V, E) is said to be a super (a, d)-H-antimagic total graph if there exist a one-to-one map f : V (G) ∪ E(G) → {1, 2, . . . , |V (G)| + |E(G)|} such that for all subgraphs isomorphic to H, the total H-weights w(H) = P v∈V (H) f(v) + P f(e) form an arithmetic sequence {a, a + d, a + 2d, ..., a + (s − 1)d}, where a and d are pos- itive integers and s is the number of all subgraphs isomorphic to H, and f : V (G) → {1, 2, . . . , |V (G)|}. The resulting super (a, d)-H antimagic total graph can potentially generates a complex key, thus by using such graph we can get a secure cryptosystem.en_US
dc.language.isoenen_US
dc.subjectSuper H-antimagic total graphen_US
dc.subjectCryptosystemen_US
dc.subjectEncryptionen_US
dc.titleThe construction of encryption key by using a super H-antimagic total graphen_US
dc.typeAbstracten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record