Search

Your search keyword '"RSA algorithm"' showing total 58 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Publication Type Conference Materials Remove constraint Publication Type: Conference Materials
58 results on '"RSA algorithm"'

Search Results

1. Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm.

2. Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial.

3. Analysis of RSA and Shor's algorithm for cryptography: A quantum perspective.

4. A novel on comparative data security analysis in public auditing for trusted cloud service with SSL encryption over RSA algorithm.

5. Analysis on improved scheme for reversible data hiding for encrypted images.

6. 5G enabled IoT network and security in healthcare.

7. A secured self-financial management application with RSA encryption technology.

8. Reduction of complexity in asymmetric cryptography using RSA, RSA-CRT and novel N-prime RSA with different keys.

9. New design of NTRU key using QKD variants.

10. Singular cubic curve over integer ring as a tool for RSA.

11. Image encryption based Laplace transformation.

12. A survey on symmetric text encryption techniques.

13. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

14. A lightweight hybrid cryptographic algorithm for WSN security using the Raspberry Pi as a node.

15. A new authentication RSA homomorphic encryption technique for prime factorization-based attacks scheme using Brahmagupta Fibonacci identity for cloud data security.

16. Digital signature authentication system in SIMP3M web application of research assessment services at Politeknik Negeri Batam.

17. Computationally efficient two – Factor authentication protocol using ECC.

18. Comparison of some parameters based on different key sizes for certain class of cryptographic algorithms.

19. Advances in data security through elliptical curve cryptography.

20. Design of hybrid cryptosystem using AES and SHA-1 algorithms.

21. Design of standard cells and macro cells for AES algorithm.

22. A hybrid combination of symmetric and asymmetric encryption technique with graph labeling.

23. A retrospective study on NTRU cryptosystem.

24. RSA and ECC universal, constant time modular inversion.

25. A new design of NTRU encryption with high security and performance level.

26. Multi prime numbers principle to expand implementation of CRT method on RSA algorithm.

27. Performance-enhancing of RSA public key via three-dimensional hyperchaotic system.

28. Security analysis of Li-Li mixture XOR scheme.

29. Comment on secure file storage and retrieval in cloud.

30. Key Factors to Become Successful Road Safety Auditor.

31. MONITORING OF GEODYNAMIC PROCESSES IN THE AREA AROUND SOFIA.

32. Security Analysis of Enhanced Schmidt-Samoa Scheme.

33. A block based Secret Sharing Scheme using Hilbert Matrix and RSA.

34. Weakness of RSA Cryptosystem Characteristic.

35. RSA Cryptosystem with Fuzzy Set Theory for Encryption and Decryption.

36. The Application of Data Encryption Technology in Computer Network Communication Security.

37. The Generalised Secured Mobile Payment System Based on ECIES and ECDSA.

39. Compression-RSA Technique: A More Efficient Encryption-Decryption Procedure.

40. The diophantine equation hard problem (DEHP) as an asymmetric primitive - Is it possible?

41. A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography.

42. Using Combined Pseudo-Random Number Generator with Digital Text-based Watermarking for Cryptography Application.

43. Loop-based RSA key generation algorithm using string identity.

44. Data security in cloud using RSA.

45. EFFICIENT UNDENIABLE THRESHOLD PROXY SIGNATURE SCHEME.

46. Image steganography in DWT domain using double-stegging with RSA encryption.

47. Dynamic router selection and encryption for data secure in Wireless Sensor Networks.

48. Multilevel Privacy Preserving in Distributed Environment using Cryptographic Technique.

49. E.Kesavulu Reddy Cryptosystem to Resistance against Simple Power Analysis Attacks in Mobile Devices.

50. Secure energy-aware multipath routing protocol with transmission range adjustment for wireless sensor networks.

Catalog

Books, media, physical & digital resources