Search

Your search keyword '"RSA algorithm"' showing total 1,012 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
1,012 results on '"RSA algorithm"'

Search Results

1. Verifiable Quantum Advantage without Structure.

2. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

3. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.

4. An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence.

5. Developing a secure voice recognition service on Raspberry Pi.

6. A novel development to encrypt data communication under t-intuitionistic fuzzy environment.

7. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

8. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

9. Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution.

10. Sustainable Business Models for Innovative Urban Mobility Services.

11. Improving the success rate of quantum algorithm attacking RSA encryption system.

12. A Review of Image Steganography Based on Multiple Hashing Algorithm.

13. Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization.

14. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

15. Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks.

16. Design of an Alternative to Polynomial Modified RSA Algorithm.

17. Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System.

18. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

19. FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS.

20. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

21. A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era.

22. Design of Data Encryption and Compression Methods.

23. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

24. Estimation of the resonance frequency of rotational and translational signals evoked by mining-induced seismicity.

25. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

26. A generic framework for blockchain-assisted on-chain auditing for off-chain storage.

27. Novel lightweight and fine-grained fast access control using RNS properties in fog computing.

28. An investigation into multidimensional information encryption through structural color in electrically responsive subwavelength gratings.

29. Boosting adversarial robustness via feature refinement, suppression, and alignment.

30. Blockchain-Based Quality Assurance System for Academic Programs.

31. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

32. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography.

33. A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map.

34. An efficient byzantine consensus mechanism based on healthcare sector in blockchain.

35. Progress in the prime factorization of large numbers.

36. Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA.

37. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

38. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

39. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity.

40. HAZARDOUS CHEMICALS LOGISTICS INTERNET OF VEHICLES BASED ON ENCRYPTION ALGORITHM.

41. A Hybrid Algorithm for Enhancement of the Data Security During Network Transmission Based on RSA, DH, and AES.

42. Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTP.

43. E2EE enhanced patient-centric blockchain-based system for EHR management.

44. The Difficulties and Decisions of Academic Misconduct in Information Forensics–A Case Study to Cryptographer.

45. Ripple spreading algorithm: a new method for solving multi-objective shortest path problems with mixed time windows.

46. Improved Vigenere Cipher-RSA-Based Medical Image Security Through Multiple Encryption Keys.

47. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA.

48. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications.

49. SECURING AND ADVANCING ROAD SAFETY IN INTELLIGENT VEHICULAR NETWORKS FOR SEAMLESS AND SECURE COMMUNICATION.

50. Rethinking Cybernetics.

Catalog

Books, media, physical & digital resources