Search

Your search keyword '"RSA algorithm"' showing total 402 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Topic public key cryptography Remove constraint Topic: public key cryptography
402 results on '"RSA algorithm"'

Search Results

1. Verifiable Quantum Advantage without Structure.

2. A novel development to encrypt data communication under t-intuitionistic fuzzy environment.

3. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

4. Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial.

5. Analysis on improved scheme for reversible data hiding for encrypted images.

6. A secured self-financial management application with RSA encryption technology.

7. Improving the success rate of quantum algorithm attacking RSA encryption system.

8. A Review of Image Steganography Based on Multiple Hashing Algorithm.

9. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

10. Design of an Alternative to Polynomial Modified RSA Algorithm.

11. A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era.

12. Design of Data Encryption and Compression Methods.

13. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

14. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

15. A generic framework for blockchain-assisted on-chain auditing for off-chain storage.

16. Novel lightweight and fine-grained fast access control using RNS properties in fog computing.

17. Blockchain-Based Quality Assurance System for Academic Programs.

18. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography.

19. Reduction of complexity in asymmetric cryptography using RSA, RSA-CRT and novel N-prime RSA with different keys.

20. An efficient byzantine consensus mechanism based on healthcare sector in blockchain.

21. Progress in the prime factorization of large numbers.

22. Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA.

23. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

24. A Hybrid Algorithm for Enhancement of the Data Security During Network Transmission Based on RSA, DH, and AES.

25. Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTP.

26. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA.

27. Rethinking Cybernetics.

28. Singular cubic curve over integer ring as a tool for RSA.

29. HYBRID ASYMMETRIC CODE-BASED CRYPTOSYSTEM.

30. A High-Security Encryption Based on Hexadecnion Polynomials.

31. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon.

32. An improved secured cloud data using dynamic rivest-shamiradleman key.

33. Improving the Robustness of RSA Encryption Through Input-Based Key Generation.

34. A new public key cryptography using Mq matrix.

35. Practical attacks on small private exponent RSA: new records and new insights.

36. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

37. A lightweight hybrid cryptographic algorithm for WSN security using the Raspberry Pi as a node.

38. A new authentication RSA homomorphic encryption technique for prime factorization-based attacks scheme using Brahmagupta Fibonacci identity for cloud data security.

39. Computationally efficient two – Factor authentication protocol using ECC.

40. Comparison of some parameters based on different key sizes for certain class of cryptographic algorithms.

41. Advances in data security through elliptical curve cryptography.

42. Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor's Algorithm.

43. Blockchain-based privacy and security model for transactional data in large private networks.

44. Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach.

45. Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.

46. Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices.

47. High-Performance Multi-RNS-Assisted Concurrent RSA Cryptosystem Architectures.

48. A New Idea for RSA Backdoors.

49. A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.

50. A New RSA Variant Based on Elliptic Curves.

Catalog

Books, media, physical & digital resources