Search

Your search keyword '"RSA algorithm"' showing total 38 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Journal aip conference proceedings Remove constraint Journal: aip conference proceedings
38 results on '"RSA algorithm"'

Search Results

1. Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm.

2. Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial.

3. Analysis of RSA and Shor's algorithm for cryptography: A quantum perspective.

4. A novel on comparative data security analysis in public auditing for trusted cloud service with SSL encryption over RSA algorithm.

5. Analysis on improved scheme for reversible data hiding for encrypted images.

6. 5G enabled IoT network and security in healthcare.

7. A secured self-financial management application with RSA encryption technology.

8. Reduction of complexity in asymmetric cryptography using RSA, RSA-CRT and novel N-prime RSA with different keys.

9. New design of NTRU key using QKD variants.

10. Singular cubic curve over integer ring as a tool for RSA.

11. Image encryption based Laplace transformation.

12. A survey on symmetric text encryption techniques.

13. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

14. A lightweight hybrid cryptographic algorithm for WSN security using the Raspberry Pi as a node.

15. A new authentication RSA homomorphic encryption technique for prime factorization-based attacks scheme using Brahmagupta Fibonacci identity for cloud data security.

16. Digital signature authentication system in SIMP3M web application of research assessment services at Politeknik Negeri Batam.

17. Computationally efficient two – Factor authentication protocol using ECC.

18. Comparison of some parameters based on different key sizes for certain class of cryptographic algorithms.

19. Advances in data security through elliptical curve cryptography.

20. Design of hybrid cryptosystem using AES and SHA-1 algorithms.

21. Design of standard cells and macro cells for AES algorithm.

22. A hybrid combination of symmetric and asymmetric encryption technique with graph labeling.

23. A retrospective study on NTRU cryptosystem.

24. RSA and ECC universal, constant time modular inversion.

25. A new design of NTRU encryption with high security and performance level.

26. Multi prime numbers principle to expand implementation of CRT method on RSA algorithm.

27. Performance-enhancing of RSA public key via three-dimensional hyperchaotic system.

28. Security analysis of Li-Li mixture XOR scheme.

29. Comment on secure file storage and retrieval in cloud.

30. Key Factors to Become Successful Road Safety Auditor.

31. Security Analysis of Enhanced Schmidt-Samoa Scheme.

32. A block based Secret Sharing Scheme using Hilbert Matrix and RSA.

33. Weakness of RSA Cryptosystem Characteristic.

34. RSA Cryptosystem with Fuzzy Set Theory for Encryption and Decryption.

35. The Application of Data Encryption Technology in Computer Network Communication Security.

36. Compression-RSA Technique: A More Efficient Encryption-Decryption Procedure.

37. The diophantine equation hard problem (DEHP) as an asymmetric primitive - Is it possible?

38. Security Analysis of RSA Cryptosystem Algorithm and it's Properties.

Catalog

Books, media, physical & digital resources