Search

Your search keyword '"RSA algorithm"' showing total 119 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Publisher mdpi Remove constraint Publisher: mdpi
119 results on '"RSA algorithm"'

Search Results

1. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.

2. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

3. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

4. Sustainable Business Models for Innovative Urban Mobility Services.

5. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

6. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

7. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

8. Blockchain-Based Quality Assurance System for Academic Programs.

9. Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTP.

10. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA.

11. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications.

12. A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol.

13. Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.

14. Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices.

15. A New Idea for RSA Backdoors.

16. A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.

17. A New RSA Variant Based on Elliptic Curves.

18. An Efficient and Secure Fog Based Routing Mechanism in IoT Network.

19. A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles.

20. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy.

21. Registered Data-Centered Lab Management System Based on Data Ownership Safety Architecture.

22. A Novel MPPT Based Reptile Search Algorithm for Photovoltaic System under Various Conditions.

23. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.

24. Some Properties of the Computation of the Modular Inverse with Applications in Cryptography.

25. An Efficient and Secure Model Using Adaptive Optimal Deep Learning for Task Scheduling in Cloud Computing.

26. Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario.

27. Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece.

28. An Innovative Blockchain-Based Secured Logistics Management Architecture: Utilizing an RSA Asymmetric Encryption Method.

29. SDA-RDOS: A New Secure Data Aggregation Protocol for Wireless Sensor Networks in IoT Resistant to DOS Attacks.

30. BBNSF: Blockchain-Based Novel Secure Framework Using RP 2 -RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems.

31. An Architecture for Managing Data Privacy in Healthcare with Blockchain.

32. SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA.

33. The Design of a Safe Charging System Based on PKS Architecture.

34. Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm.

35. Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions.

36. On (Unknowingly) Using Near-Square RSA Primes.

37. An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion.

38. Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms.

39. Analysis of Malicious Node Identification Algorithm of Internet of Vehicles under Blockchain Technology: A Case Study of Intelligent Technology in Automotive Engineering.

40. A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks.

41. Revisiting the Polynomial-Time Equivalence of Computing the CRT-RSA Secret Key and Factoring.

42. Spectrum-Entropy-Minimized Routing and Spectrum Allocation in IP over Mixed-Fixed/Flex-Grid Optical Networks.

43. An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms.

44. Brown-Field Migration Aware Routing and Spectrum Assignment in Backbone Optical Networks.

45. HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme.

46. Quantum Key Distribution Networks: Challenges and Future Research Issues in Security.

47. SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search.

48. Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation.

49. On the Security of Practical Mail User Agents against Cache Side-Channel Attacks †.

50. Publicly Verifiable Spatial and Temporal Aggregation Scheme Against Malicious Aggregator in Smart Grid.

Catalog

Books, media, physical & digital resources