Search

Your search keyword '"RSA algorithm"' showing total 128 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Topic cryptosystems Remove constraint Topic: cryptosystems
128 results on '"RSA algorithm"'

Search Results

1. A novel development to encrypt data communication under t-intuitionistic fuzzy environment.

2. Blockchain-Based Quality Assurance System for Academic Programs.

3. A High-Security Encryption Based on Hexadecnion Polynomials.

4. Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.

5. A New Idea for RSA Backdoors.

6. A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.

7. A New RSA Variant Based on Elliptic Curves.

8. Encrypted model predictive control design for security to cyberattacks.

9. Event-Triggered Impulsive Controller Design for Synchronization of Delayed Chaotic Neural Networks and Its Fractal Reconstruction: An Application to Image Encryption.

10. Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA.

11. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains.

12. S.O.S. Save Our Secrets.

13. A novel public-key encryption scheme based on Bass cyclic units in integral group rings.

14. A variant of RSA using continued fractions.

15. CRYPTANALYSIS OF RSA-LIKE CRYPTOSYSTEM WITH MODULUS N = pq AND ed ≡ 1(mod (p² + p + 1)(q² + q + 1)).

17. A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations.

18. Hybrid symmetric cryptography approach for secure communication in web application.

19. SECURE RSA CRYPTOSYSTEM BASED ON MULTIPLE KEYS.

20. LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding.

21. An improved anti-quantum MST3 public key encryption scheme for remote sensing images.

22. High Speed Public Key Encryption using Hyperboloid for Work from Home.

23. Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes.

24. Elliptic curve Diffie–Hellman cryptosystem in big data cloud security.

25. A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem.

26. Decryption speed up of ElGamal with composite modulus.

27. A Fast and Secure RSA Public Key Cryptosystem.

28. Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.

29. The new Weakness of RSA and The Algorithm to Solve this Problem.

30. The new Weakness of RSA and The Algorithm to Solve this Problem.

31. A privacy‐preserving biometrics based authenticated key agreement scheme using ECC.

32. Hybrid cryptosystem based on plaintext related computational ghost imaging encryption and elliptic curve algorithm.

33. From Minicrypt to Obfustopia via Private-Key Functional Encryption.

34. Secure limitation analysis of public-key cryptography for smart card settings.

35. The Use of Context-Free Probabilistic Grammar to Anonymise Statistical Data.

36. A Unified Method for Private Exponent Attacks on RSA Using Lattices.

37. Novel updatable identity-based hash proof system and its applications.

38. Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.

39. Performance evaluation of M-ary algorithm using reprogrammable hardware

40. Weakness of RSA Cryptosystem Characteristic.

41. Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.

42. An Indistinguishably Secure Function Encryption Scheme.

43. A privacy encryption algorithm based on an improved chaotic system.

44. CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.

45. Fast and Area Efficient Implementation of RSA Algorithm.

46. On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(𝜁2𝑠).

47. On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(𝜁2𝑠).

48. A New Attack on Special-Structured RSA Primes.

49. Simulation-based selective opening security for receivers under chosen-ciphertext attacks.

50. A new attack on RSA and Demytko's elliptic curve cryptosystem.

Catalog

Books, media, physical & digital resources