Search

Your search keyword '"RSA algorithm"' showing total 600 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
600 results on '"RSA algorithm"'

Search Results

1. Verifiable Quantum Advantage without Structure.

2. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

3. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.

4. An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence.

5. A novel development to encrypt data communication under t-intuitionistic fuzzy environment.

6. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

7. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

8. Sustainable Business Models for Innovative Urban Mobility Services.

9. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

10. Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System.

11. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

12. Design of Data Encryption and Compression Methods.

13. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

14. Estimation of the resonance frequency of rotational and translational signals evoked by mining-induced seismicity.

15. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

16. An investigation into multidimensional information encryption through structural color in electrically responsive subwavelength gratings.

17. Boosting adversarial robustness via feature refinement, suppression, and alignment.

18. Blockchain-Based Quality Assurance System for Academic Programs.

19. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

20. Progress in the prime factorization of large numbers.

21. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity.

22. HAZARDOUS CHEMICALS LOGISTICS INTERNET OF VEHICLES BASED ON ENCRYPTION ALGORITHM.

23. Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTP.

24. E2EE enhanced patient-centric blockchain-based system for EHR management.

25. The Difficulties and Decisions of Academic Misconduct in Information Forensics–A Case Study to Cryptographer.

26. Ripple spreading algorithm: a new method for solving multi-objective shortest path problems with mixed time windows.

27. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA.

28. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications.

29. SECURING AND ADVANCING ROAD SAFETY IN INTELLIGENT VEHICULAR NETWORKS FOR SEAMLESS AND SECURE COMMUNICATION.

30. A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model.

31. Security enhancement of cyber-physical system using modified encryption AESGNRSA technique.

32. Secure image transmission through LTE wireless communications systems.

33. Timed-release encryption anonymous interaction protocol based on smart contract.

34. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon.

35. Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.

36. An improved secured cloud data using dynamic rivest-shamiradleman key.

37. Improving the Robustness of RSA Encryption Through Input-Based Key Generation.

38. Practical attacks on small private exponent RSA: new records and new insights.

39. Network Architecture and Security Assessment in Industry 4.0 for Smart Manufacturing

40. Application of Hierarchical Protection Security Mechanism in Database to Party Building in Colleges and Universities

41. Computational ghost imaging encryption using RSA algorithm and discrete wavelet transform

42. Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor's Algorithm.

43. Blockchain-based privacy and security model for transactional data in large private networks.

44. A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol.

45. Linear-time 2-party secure merge from additively homomorphic encryption.

46. Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.

47. Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices.

48. High-Performance Multi-RNS-Assisted Concurrent RSA Cryptosystem Architectures.

49. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication.

50. A New Idea for RSA Backdoors.

Catalog

Books, media, physical & digital resources