Please use this identifier to cite or link to this item: https://repository.unej.ac.id/xmlui/handle/123456789/85639
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPrihandoko, Antonius Cahya-
dc.contributor.authorDafik, Dafik-
dc.contributor.authorAgustin, Ika Hesti-
dc.contributor.authorD. Susanto-
dc.contributor.authorSlamin, Slamin-
dc.date.accessioned2018-04-30T04:26:31Z-
dc.date.available2018-04-30T04:26:31Z-
dc.date.issued2018-04-30-
dc.identifier.isbn978-602-74668-0-7-
dc.identifier.urihttp://repository.unej.ac.id/handle/123456789/85639-
dc.descriptionProgram & Abstracts Book AMC 2016 (The Asian Mathematical Conference)en_US
dc.description.abstractThe strength of cryptosystem relays on the management of encryption key. The key should be managed such that it is hard for any intruder to analyze the key. Thus, the main issue is how to make the relation between plaintext, ciphertext and the key is hidden. This paper will study the use of super (a, d)-H antimagic total graph in developing an encryption key to achieve the security. Let H be a simple, connected and undirected graph. A graph G = (V, E) is said to be a super (a, d)-H-antimagic total graph if there exist a one-to-one map f : V (G) ∪ E(G) → {1, 2, . . . , |V (G)| + |E(G)|} such that for all subgraphs isomorphic to H, the total H-weights w(H) = P v∈V (H) f(v) + P f(e) form an arithmetic sequence {a, a + d, a + 2d, ..., a + (s − 1)d}, where a and d are pos- itive integers and s is the number of all subgraphs isomorphic to H, and f : V (G) → {1, 2, . . . , |V (G)|}. The resulting super (a, d)-H antimagic total graph can potentially generates a complex key, thus by using such graph we can get a secure cryptosystem.en_US
dc.language.isoenen_US
dc.subjectSuper H-antimagic total graphen_US
dc.subjectCryptosystemen_US
dc.subjectEncryptionen_US
dc.titleThe construction of encryption key by using a super H-antimagic total graphen_US
dc.typeAbstracten_US
Appears in Collections:LSP-Abstract

Files in This Item:
File Description SizeFormat 
F. IK_Makalah_Antonius CP_The construction of encryption.pdf1.88 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.