Search

Your search keyword '"RSA algorithm"' showing total 1,300 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm"
1,300 results on '"RSA algorithm"'

Search Results

1. Verifiable Quantum Advantage without Structure.

2. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

3. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.

4. Developing a secure voice recognition service on Raspberry Pi.

5. A novel development to encrypt data communication under t-intuitionistic fuzzy environment.

6. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

7. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

8. Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution.

9. Sustainable Business Models for Innovative Urban Mobility Services.

10. Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm.

11. Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial.

12. Analysis of RSA and Shor's algorithm for cryptography: A quantum perspective.

13. A novel on comparative data security analysis in public auditing for trusted cloud service with SSL encryption over RSA algorithm.

14. Analysis on improved scheme for reversible data hiding for encrypted images.

15. 5G enabled IoT network and security in healthcare.

16. A secured self-financial management application with RSA encryption technology.

17. Improving the success rate of quantum algorithm attacking RSA encryption system.

18. A Review of Image Steganography Based on Multiple Hashing Algorithm.

19. Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization.

20. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

21. Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks.

22. Design of an Alternative to Polynomial Modified RSA Algorithm.

23. Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System.

24. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

25. FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS.

26. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

27. A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era.

28. Design of Data Encryption and Compression Methods.

29. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

30. Estimation of the resonance frequency of rotational and translational signals evoked by mining-induced seismicity.

31. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

32. A generic framework for blockchain-assisted on-chain auditing for off-chain storage.

33. Novel lightweight and fine-grained fast access control using RNS properties in fog computing.

34. An investigation into multidimensional information encryption through structural color in electrically responsive subwavelength gratings.

35. Boosting adversarial robustness via feature refinement, suppression, and alignment.

36. Blockchain-Based Quality Assurance System for Academic Programs.

37. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

38. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography.

39. A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map.

40. Reduction of complexity in asymmetric cryptography using RSA, RSA-CRT and novel N-prime RSA with different keys.

41. Design and Develop a Hybrid Encryption Techniques for Securing Data on Banking Systems Over Cloud

42. Chaotic System Image Encryption Algorithm Base RSA

45. An efficient byzantine consensus mechanism based on healthcare sector in blockchain.

46. Progress in the prime factorization of large numbers.

47. Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA.

48. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

49. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

50. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity.

Catalog

Books, media, physical & digital resources