Search

Your search keyword '"RSA algorithm"' showing total 338 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Topic cryptography Remove constraint Topic: cryptography
338 results on '"RSA algorithm"'

Search Results

1. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

2. Analysis on improved scheme for reversible data hiding for encrypted images.

3. A Review of Image Steganography Based on Multiple Hashing Algorithm.

4. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

5. FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS.

6. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

7. Design of Data Encryption and Compression Methods.

8. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

9. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

10. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography.

11. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

12. A Hybrid Algorithm for Enhancement of the Data Security During Network Transmission Based on RSA, DH, and AES.

13. Improved Vigenere Cipher-RSA-Based Medical Image Security Through Multiple Encryption Keys.

14. Post-Quantum Signatures on RISC-V with Hardware Acceleration.

15. New design of NTRU key using QKD variants.

16. Secure image transmission through LTE wireless communications systems.

17. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon.

18. Improving the Robustness of RSA Encryption Through Input-Based Key Generation.

19. A new public key cryptography using Mq matrix.

20. Practical attacks on small private exponent RSA: new records and new insights.

21. A new authentication RSA homomorphic encryption technique for prime factorization-based attacks scheme using Brahmagupta Fibonacci identity for cloud data security.

23. Advances in data security through elliptical curve cryptography.

24. Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach.

25. Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.

26. Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices.

27. A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.

28. Security Implementation on IoT using CoAP and Elliptical Curve Cryptography.

29. A Comparative Analysis of Traditional and Lightweight Algorithms.

30. Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security

31. The quest for perfect security.

33. Some Properties of the Computation of the Modular Inverse with Applications in Cryptography.

34. A Secure and High Capacity Image Steganography Approach Using Huffman Coding and RSA Encryption.

35. IMPLEMENTATION OF CRYPTOGRAPHIC ALGORITHMS USING MOORE MACHINE AND RECURRENCE MATRIX.

36. Design of standard cells and macro cells for AES algorithm.

37. A hybrid combination of symmetric and asymmetric encryption technique with graph labeling.

38. A retrospective study on NTRU cryptosystem.

39. Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme.

40. Aplikasi Tandatangan Digital dalam Proses Verifikasi dan Validasi Sertifikat Covid-19.

41. HYBRID APPROACHES IN CRYPTOGRAPHY.

42. Security Techniques in Cloud Computing for Cloud Data Storage.

43. A STUDY AND COMPARISON OF THE VARIOUS CRYPTOGRAPHY TECHNIQUE STANDARDS WITHIN FIFTEEN FACTORS.

44. IMPLEMENTACIJA STEGANOGRAFIJE I KRIPTOGRAFSKIH ALGORITAMA U MATLAB-U.

45. Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA.

46. Analysing RSA and PAILLIER homomorphic Property for security in Cloud.

47. Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy.

48. A Study of Data Hiding Using Cryptography and Steganography

49. Voice Password-Based Secured Communication Using RSA and ElGamal Algorithm

50. An Architecture for Managing Data Privacy in Healthcare with Blockchain.

Catalog

Books, media, physical & digital resources