Search

Your search keyword '"RSA algorithm"' showing total 151 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Topic rsa Remove constraint Topic: rsa
151 results on '"RSA algorithm"'

Search Results

1. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

2. A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map.

3. A Hybrid Algorithm for Enhancement of the Data Security During Network Transmission Based on RSA, DH, and AES.

4. Improved Vigenere Cipher-RSA-Based Medical Image Security Through Multiple Encryption Keys.

5. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA.

6. Security enhancement of cyber-physical system using modified encryption AESGNRSA technique.

7. Secure image transmission through LTE wireless communications systems.

8. Enhancing Key Exchange Security: Leveraging RSA Protocol in Encryption Algorithm Based on Hyperchaotic System.

9. Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach.

10. An Efficient and Secure Communication Mechanism for Internet of Things Based Connected Devices.

11. A New Idea for RSA Backdoors.

12. A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.

13. A New RSA Variant Based on Elliptic Curves.

14. Yeni önerilmiş ikili fare sürüsü algoritması.

15. Security Implementation on IoT using CoAP and Elliptical Curve Cryptography.

16. A generic model for security algorithms in mobile electronic payment systems.

17. On a Generalization of RSA Crypto-system By Using 2-Cyclic Refined Integers.

18. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication.

19. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy.

20. A Secure and High Capacity Image Steganography Approach Using Huffman Coding and RSA Encryption.

21. Aplikasi Tandatangan Digital dalam Proses Verifikasi dan Validasi Sertifikat Covid-19.

22. HYBRID APPROACHES IN CRYPTOGRAPHY.

23. Hybrid encryption prototype combining AES and RSA encryption methods.

24. SECURE AND EFFICIENT DATA TRANSFER IN AODV ROUTING PROTOCOL USING RSA ENCRYPTION.

25. IMPLEMENTACIJA STEGANOGRAFIJE I KRIPTOGRAFSKIH ALGORITAMA U MATLAB-U.

26. Analysing RSA and PAILLIER homomorphic Property for security in Cloud.

27. Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy.

28. SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA.

29. Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm.

30. Exponential increment of RSA attack range via lattice based cryptanalysis.

31. HYBRID ENCRYPTION USING LSB STEGANOGRAPHY AND RSA.

32. Secure multi-cloud resource allocation with SDN and self-adaptive authentication.

33. Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain.

34. Implementation of Efficient Security Algorithm and Performance Improvement Through ODMRP Protocol in VANET Environment.

35. Hybrid HOG-SVM encrypted face detection and recognition model.

36. Cryptanalytic attacks on RSA algorithm and its variants.

37. Parallel and bias-free RSA algorithm for maximal Poisson-sphere sampling.

38. A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations.

39. Hybrid symmetric cryptography approach for secure communication in web application.

40. High speed data encryption technique with optimized memory based RSA algorithm for communications.

41. RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.

42. Enhancing E-Commerce Security using RSA Through Burnside Curve Cryptography.

43. A Time-/Frequency-Domain Side-Channel Attack Resistant AES-128 and RSA-4K Crypto-Processor in 14-nm CMOS.

44. Enhancing cloud computing security by paillier homomorphic encryption.

45. A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based.

46. DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network.

47. High Speed Public Key Encryption using Hyperboloid for Work from Home.

48. Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes.

49. FIRMA DIGITAL BASADA EN CRIPTOGRAFÍA ASIMÉTRICA PARA GENERACIÓN DE HISTORIAL CLÍNICO.

50. An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem.

Catalog

Books, media, physical & digital resources