Search

Your search keyword '"RSA algorithm"' showing total 155 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Topic algorithms Remove constraint Topic: algorithms
155 results on '"RSA algorithm"'

Search Results

1. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.

2. Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm.

3. Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial.

4. A Review of Image Steganography Based on Multiple Hashing Algorithm.

5. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

6. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

7. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

8. HAZARDOUS CHEMICALS LOGISTICS INTERNET OF VEHICLES BASED ON ENCRYPTION ALGORITHM.

9. Ripple spreading algorithm: a new method for solving multi-objective shortest path problems with mixed time windows.

10. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA.

11. A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model.

12. An improved secured cloud data using dynamic rivest-shamiradleman key.

13. Improving the Robustness of RSA Encryption Through Input-Based Key Generation.

14. Practical attacks on small private exponent RSA: new records and new insights.

15. Enhancing Key Exchange Security: Leveraging RSA Protocol in Encryption Algorithm Based on Hyperchaotic System.

16. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

17. A lightweight hybrid cryptographic algorithm for WSN security using the Raspberry Pi as a node.

18. Digital signature authentication system in SIMP3M web application of research assessment services at Politeknik Negeri Batam.

19. Comparison of some parameters based on different key sizes for certain class of cryptographic algorithms.

20. Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor's Algorithm.

21. Linear-time 2-party secure merge from additively homomorphic encryption.

22. A generic model for security algorithms in mobile electronic payment systems.

23. A Comparative Analysis of Traditional and Lightweight Algorithms.

24. Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm.

25. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication.

26. Design of hybrid cryptosystem using AES and SHA-1 algorithms.

27. A survey on attribute-based encryption for Internet of Things.

28. Research on CLIB Routing and Spectrum Allocation Algorithm in Elastic Optical Networks.

29. IMPLEMENTATION OF CRYPTOGRAPHIC ALGORITHMS USING MOORE MACHINE AND RECURRENCE MATRIX.

30. Design of standard cells and macro cells for AES algorithm.

31. Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data.

32. Energy‐efficient and privacy‐preserving approach for Internet of Things nodes using a novel hybrid fuzzy water cycle and evaporation strategy and matrix‐based Rivest–Shamir–Adleman encryption algorithm.

33. Design of digital image encryption based on elliptic curve cryptography (ECC) algorithm and Radix-64 conversion.

34. SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA.

35. Algorithm substitution attacks against receivers.

36. Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions.

37. On (Unknowingly) Using Near-Square RSA Primes.

38. An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion.

39. Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms.

40. Analysis of Malicious Node Identification Algorithm of Internet of Vehicles under Blockchain Technology: A Case Study of Intelligent Technology in Automotive Engineering.

41. IMPROVEMENT OF THE PSEUDORANDOM KEY SEQUENCES GENERATION ALGORITHM BASED ON CELLULAR AUTOMATON AND MANY-VALUED LOGIC BENT-SEQUENCES.

42. Survey on routing and spectrum allocation algorithm in elastic optical networks.

43. An improved parallel Random Sequential Addition algorithm in RMC code for dispersion fuel analysis.

44. Energy Efficient Lightweight Cryptography Algorithms for IoT Devices.

45. A variant RSA acceleration with parallelisation.

46. Implementation of Efficient Security Algorithm and Performance Improvement Through ODMRP Protocol in VANET Environment.

47. An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms.

48. Post-quantum cryptography-driven security framework for cloud computing.

49. Parallel and bias-free RSA algorithm for maximal Poisson-sphere sampling.

50. New constructions of equality test scheme for cloud-assisted wireless sensor networks.

Catalog

Books, media, physical & digital resources