Journal articles on the topic 'RSA cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'RSA cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kondratyonok, Nikita V. "Analysis of the RSA-cryptosystem in abstract number rings." Journal of the Belarusian State University. Mathematics and Informatics, no. 1 (March 30, 2020): 13–21. http://dx.doi.org/10.33581/2520-6508-2020-1-13-21.
Full textSaid, Mohamad Rushdan Md, and John Loxton. "A cubic analogue of the RSA cryptosystem." Bulletin of the Australian Mathematical Society 68, no. 1 (August 2003): 21–38. http://dx.doi.org/10.1017/s0004972700037382.
Full textJung, Achim. "Implementing the RSA cryptosystem." Computers & Security 6, no. 4 (August 1987): 342–50. http://dx.doi.org/10.1016/0167-4048(87)90070-8.
Full textJung, A. "Implementing the RSA cryptosystem." Computers & Security 7, no. 5 (October 1988): 510–11. http://dx.doi.org/10.1016/0167-4048(88)90213-1.
Full textMaxrizal, Maxrizal. "Public Key Cryptosystem Based on Singular Matrix." Trends in Sciences 19, no. 3 (January 20, 2022): 2147. http://dx.doi.org/10.48048/tis.2022.2147.
Full textMAJID, REZA NAGHIZADEH, ELANKOVAN SUNDARARAJAN, and ZULKARNAIN MD ALI. "AN EFFICIENT METHOD FOR IMPROVING THE COMPUTATIONAL PERFORMANCE OF THE CUBIC LUCAS CRYPTOSYSTEM." Bulletin of the Australian Mathematical Society 90, no. 1 (April 10, 2014): 160–71. http://dx.doi.org/10.1017/s000497271400001x.
Full textUkwuoma, Henry Chima, Gabriel Arome, Aderonke Thompson, and Boniface Kayode Alese. "Post-quantum cryptography-driven security framework for cloud computing." Open Computer Science 12, no. 1 (January 1, 2022): 142–53. http://dx.doi.org/10.1515/comp-2022-0235.
Full textSabeena, S. Jenifa, and S. Antelin Vijila. "Moulded RSA and DES (MRDES) Algorithm for Data Security." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 12 (December 31, 2022): 12–20. http://dx.doi.org/10.17762/ijritcc.v10i12.5836.
Full textSawant, Shreedatta, Vaishnavi Kamat, Vishal Snedan Robertson, Sneha Kamat, Anish Thali, and Anuj Shetgaonkar. "RSA-A Symmetric Key Cryptosystem." IOSR Journal of Computer Engineering 19, no. 03 (June 2017): 53–57. http://dx.doi.org/10.9790/0661-1903035357.
Full textSawant, Shreedatta, Vaishnavi Kamat, Vishal Snedan Robertson, Sneha Kamat, Anish Thali, and Anuj Shetgaonkar. "RSA-A Symmetric Key Cryptosystem." IOSR Journal of Computer Engineering 19, no. 03 (June 2017): 75–79. http://dx.doi.org/10.9790/0661-1903037579.
Full textFalah Hameed Al Saffar, Najlae. "Steganography Algorithm Based RSA Cryptosystem." Journal of Engineering and Applied Sciences 14, no. 7 (December 31, 2019): 2240–43. http://dx.doi.org/10.36478/jeasci.2019.2240.2243.
Full textLI, Yun-fei, Qing LIU, Lin HAO, and Bao-lin ZHOU. "Efficient variant of RSA cryptosystem." Journal of Computer Applications 30, no. 9 (November 30, 2010): 2393–97. http://dx.doi.org/10.3724/sp.j.1087.2010.02393.
Full textSalah, Imad Khaled, Abdullah Darwish, and Saleh Oqeili. "Mathematical Attacks on RSA Cryptosystem." Journal of Computer Science 2, no. 8 (August 1, 2006): 665–71. http://dx.doi.org/10.3844/jcssp.2006.665.671.
Full textPetukhova, K. A., and S. N. Tronin. "RSA cryptosystem for dedekind rings." Lobachevskii Journal of Mathematics 37, no. 3 (May 2016): 284–87. http://dx.doi.org/10.1134/s1995080216030197.
Full textKamardan, M. Ghazali, N. Aminudin, Norziha Che-Him, Suliadi Sufahani, Kamil Khalid, and Rozaini Roslan. "Modified Multi Prime RSA Cryptosystem." Journal of Physics: Conference Series 995 (April 2018): 012030. http://dx.doi.org/10.1088/1742-6596/995/1/012030.
Full textLaurichesse, Denis, and Laurent Blain. "Optimized implementation of RSA cryptosystem." Computers & Security 10, no. 3 (May 1991): 263–67. http://dx.doi.org/10.1016/0167-4048(91)90042-c.
Full textBalasubramanian, Dr Kannan, M. Arun, and Dr K. R. Sekar. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security 2, no. 2 (November 30, 2022): 1–4. http://dx.doi.org/10.54105/ijcns.b1421.112222.
Full textSingh, Soram Ranbir, and Khan Kumar Ajoy. "Choosing a Suitable Public Cryptosystem for Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 402–8. http://dx.doi.org/10.1166/jctn.2020.8682.
Full textABDALWAHID, Shadan Mohammed Jihad, Raghad Zuhair YOUSIF, and Shahab Wahhab KAREEM. "ENHANCING APPROACH USING HYBRID PAILLER AND RSA FOR INFORMATION SECURITY IN BIGDATA." Applied Computer Science 15, no. 4 (December 30, 2019): 63–74. http://dx.doi.org/10.35784/acs-2019-30.
Full textJoshi, Anshu, and Vijay Anand. "Design of Novel Key Generation Technique Based RSA Algorithm for Efficient Data Encryption and Decryption." ECS Transactions 107, no. 1 (April 24, 2022): 2585–92. http://dx.doi.org/10.1149/10701.2585ecst.
Full textMISHRA, D. C., R. K. SHARMA, MANISH KUMAR, and KULDEEP KUMAR. "SECURITY OF COLOR IMAGE DATA DESIGNED BY PUBLIC-KEY CRYPTOSYSTEM ASSOCIATED WITH 2D-DWT." Fractals 22, no. 04 (November 12, 2014): 1450011. http://dx.doi.org/10.1142/s0218348x1450011x.
Full textNibir, DM Zunayed Kamal, Salma Nasrin, and Sarker Md Sohel Rana. "A Variant of the RSA Cryptosystem with Smaller Keys." Dhaka University Journal of Science 70, no. 2 (December 18, 2022): 15–17. http://dx.doi.org/10.3329/dujs.v70i2.62600.
Full textWang, Shuodong. "A Study of the Use of Euler Totient Function in RSA Cryptosystem and the Future of RSA Cryptosystem." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012030. http://dx.doi.org/10.1088/1742-6596/2386/1/012030.
Full textPradhan, Sushma, and Birendra Kumar Sharma. "Improved Semantically Secured Variant of RSA Public Key Cryptosystem." International Journal of Informatics and Communication Technology (IJ-ICT) 4, no. 3 (December 1, 2015): 91. http://dx.doi.org/10.11591/ijict.v4i3.pp91-97.
Full textKareem, Shahab Wahhab, Raghad Zuhair Yousif, and Shadan Mohammed Jihad Abdalwahid. "An approach for enhancing data confidentiality in Hadoop." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 3 (December 1, 2020): 1547. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1547-1555.
Full textZhong, Yutong. "An Overview of RSA and OAEP Padding." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 82–86. http://dx.doi.org/10.54097/hset.v1i.431.
Full textGao, Ming Hu, and Hong Yuan Huang. "A New Efficient Variant of the Batch RSA Cryptosystem." Advanced Materials Research 756-759 (September 2013): 2660–62. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2660.
Full textKhramova, N. A. "RESEARCH OF THE RSA CRYPTOSYSTEM FOR ENCRYPTION OF INFORMATION." Современные наукоемкие технологии (Modern High Technologies), no. 9 2020 (2020): 88–93. http://dx.doi.org/10.17513/snt.38220.
Full textLong, Trần Đình. "A VARIANT OF RSA CRYPTOSYSTEM ON THE ENDOMORPHISM RING End(Z_n×Z_(n^k ))." Hue University Journal of Science: Natural Science 127, no. 1A (August 6, 2018): 101. http://dx.doi.org/10.26459/hueuni-jns.v127i1a.4746.
Full textChang, Hung Wei, Che Wun Chiou, Wen Yew Liang, and Jenq Haur Wang. "Full Multiplexers Implementation of Dual Basis Multiplier over GF(2m)." Applied Mechanics and Materials 284-287 (January 2013): 3423–27. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3423.
Full textAbd Ghafar, Amir Hamzah, Muhammad Rezal Kamel Ariffin, and Muhammad Asyraf Asbullah. "A New LSB Attack on Special-Structured RSA Primes." Symmetry 12, no. 5 (May 20, 2020): 838. http://dx.doi.org/10.3390/sym12050838.
Full textA.V.RamaChandraRao, G., P. V. Lakshmi, and N. Ravi Shankar. "RSA Public Key Cryptosystem using Modular Multiplication." International Journal of Computer Applications 80, no. 5 (October 18, 2013): 38–42. http://dx.doi.org/10.5120/13860-1707.
Full textJamnig, Peter. "SECURING THE RSA-CRYPTOSYSTEM AGAINST CYCLING ATTACKS." Cryptologia 12, no. 3 (July 1988): 159–64. http://dx.doi.org/10.1080/0161-118891862891.
Full textRahmadani, R., H. Mawengkang, and Sutarman. "Hybrid cryptosystem RSA – CRT optimization and VMPC." Journal of Physics: Conference Series 978 (March 2018): 012041. http://dx.doi.org/10.1088/1742-6596/978/1/012041.
Full textJamnig, Peter. "Securing the RSA- cryptosystem against cycling attacks." Computers & Security 7, no. 5 (October 1988): 526–27. http://dx.doi.org/10.1016/0167-4048(88)90311-2.
Full textGarg, Vibhor, and V. Arunachalam. "Architectural Analysis of RSA Cryptosystem on FPGA." International Journal of Computer Applications 26, no. 8 (July 31, 2011): 30–34. http://dx.doi.org/10.5120/3124-4299.
Full textKaminaga, Masahiro, Takashi Watanabe, Takashi Endo, and Toshio Okochi. "Power analysis and countermeasure of RSA cryptosystem." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 89, no. 8 (2006): 10–20. http://dx.doi.org/10.1002/ecjc.20213.
Full textYousif, Raghad Z., Shahab W. Kareem, and Shadan M. Abdalwahid. "Enhancing Approach for Information Security in Hadoop." Polytechnic Journal 10, no. 1 (June 30, 2020): 81–87. http://dx.doi.org/10.25156/ptj.v10n1y2020.pp81-87.
Full textMarkova, N. V. "A new method for generating keys in the RSA cryptosystem." Dal'nevostochnyi Matematicheskii Zhurnal 20, no. 2 (November 25, 2020): 221–23. http://dx.doi.org/10.47910/femj202021.
Full textLi, Lifeng. "Application of Data Encryption Technology in Computer Network Information Security." Security and Communication Networks 2022 (August 2, 2022): 1–8. http://dx.doi.org/10.1155/2022/7472205.
Full textGupta, Chiradeep, and N. V. Subba Reddy. "Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012014. http://dx.doi.org/10.1088/1742-6596/2161/1/012014.
Full textRomankov, V. A. "A SEMANTICALLY SECURE PUBLIC-KEY CRYPTOSYSTEM BASED ON RSA." PRIKLADNAYa DISKRETNAYa MATEMATIKA, no. 29(3) (September 1, 2015): 32–40. http://dx.doi.org/10.17223/20710410/29/3.
Full textTahat, Nedal, Ashraf A. Tahat, Maysam Abu-Dalu, Ramzi B. Albadarneh, Alaa E. Abdallah, and Obaida M. Al-Hazaimeh. "A new RSA public key encryption scheme with chaotic maps." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1430. http://dx.doi.org/10.11591/ijece.v10i2.pp1430-1437.
Full textJ.L. Padmaja, Ch, V. S.Bhagavan, and B. Srinivas. "On using Aryabhatta Remainder Theorem to Decrypt a Message with RPrime and Rebalanced RSA." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 758. http://dx.doi.org/10.14419/ijet.v7i2.7.10940.
Full textMezher, Ahmed Eskander. "Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3949. http://dx.doi.org/10.11591/ijece.v8i5.pp3949-3953.
Full textWong, T. J., L. F. Koo, F. H. Naning, A. F. N. Rasedee, M. M. Magiman, and M. H. A. Sathar. "A CUBIC EL-GAMAL ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE AND ELLIPTIC CURVE." Advances in Mathematics: Scientific Journal 10, no. 11 (November 23, 2021): 3439–47. http://dx.doi.org/10.37418/amsj.10.11.5.
Full textWong, T. J., L. F. Koo, F. H. Naning, A. F. N. Rasedee, M. M. Magiman, and M. H. A. Sathar. "A CUBIC EL-GAMAL ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE AND ELLIPTIC CURVE." Advances in Mathematics: Scientific Journal 10, no. 11 (November 23, 2021): 3439–47. http://dx.doi.org/10.37418/amsj.10.111.5.
Full textOmollo, Richard, and Arnold Okoth. "Large Semi Primes Factorization with Its Implications to RSA Cryptosystems." BOHR International Journal of Smart Computing and Information Technology 3, no. 1 (2020): 1–8. http://dx.doi.org/10.54646/bijscit.011.
Full textBegum, Mahbuba, Jannatul Ferdush, and Md Golam. "A Hybrid Cryptosystem using DNA, OTP and RSA." International Journal of Computer Applications 172, no. 8 (August 17, 2017): 30–33. http://dx.doi.org/10.5120/ijca2017915198.
Full textVerma. "CARRY SAVE COMMON MULTIPLICAND MONTGOMERY FOR RSA CRYPTOSYSTEM." American Journal of Applied Sciences 11, no. 5 (May 1, 2014): 851–56. http://dx.doi.org/10.3844/ajassp.2014.851.856.
Full text