Works matching RSA (cryptosystem)
Results: 181
Octonion Polynomials for a More Secure RSA Public Key Cryptosystem.
- Published in:
- International Journal of Mathematics & Computer Science, 2025, v. 20, n. 1, p. 281, doi. 10.69793/ijmcs/01.2025/yassein
- By:
- Publication type:
- Article
A novel multi-layer color image encryption based on RSA cryptosystem, RP2DFrHT and generalized 2D Arnold map.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 25, p. 38509, doi. 10.1007/s11042-023-14829-9
- By:
- Publication type:
- Article
QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System.
- Published in:
- Wireless Personal Communications, 2022, v. 122, n. 1, p. 755, doi. 10.1007/s11277-021-08924-z
- By:
- Publication type:
- Article
RSA Cryptosystem Encryption Based on Three Moduli Set With Common Factor {2n+2, 2n+1,2n}.
- Published in:
- Computing & Information Systems, 2018, v. 22, n. 3, p. 27
- By:
- Publication type:
- Article
A Fast and Secure RSA Public Key Cryptosystem.
- Published in:
- Journal of Mathematical Extension, 2020, v. 14, n. 4, p. 1
- By:
- Publication type:
- Article
Molecular solutions of the RSA public-key cryptosystem on a DNA-based computer.
- Published in:
- Journal of Supercomputing, 2012, v. 61, n. 3, p. 642, doi. 10.1007/s11227-011-0627-z
- By:
- Publication type:
- Article
CRYPTANALYSIS OF RSA-LIKE CRYPTOSYSTEM WITH MODULUS N = pq AND ed ≡ 1(mod (p² + p + 1)(q² + q + 1)).
- Published in:
- South East Asian Journal of Mathematics & Mathematical Sciences, 2021, v. 17, n. 3, p. 1
- By:
- Publication type:
- Article
Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain.
- Published in:
- Information Security Journal: A Global Perspective, 2022, v. 31, n. 1, p. 49, doi. 10.1080/19393555.2021.1963018
- By:
- Publication type:
- Article
Mixed-multiple image encryption algorithm using RSA cryptosystem with fractional discrete cosine transform and 2D-Arnold Transform.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 13, p. 38055, doi. 10.1007/s11042-023-16953-y
- By:
- Publication type:
- Article
Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication.
- Published in:
- Sustainability (2071-1050), 2018, v. 10, n. 10, p. 3588, doi. 10.3390/su10103588
- By:
- Publication type:
- Article
High-Performance Multi-RNS-Assisted Concurrent RSA Cryptosystem Architectures.
- Published in:
- Journal of Circuits, Systems & Computers, 2023, v. 32, n. 15, p. 1, doi. 10.1142/S0218126623502559
- By:
- Publication type:
- Article
A BLIND SIGNATURE BASED ON THE DLP AND RSA CRYPTOSYSTEM.
- Published in:
- Gulf Journal of Mathematics, 2018, v. 6, n. 4, p. 44, doi. 10.56947/gjom.v6i4.247
- By:
- Publication type:
- Article
Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00289-7
- By:
- Publication type:
- Article
A cubic analogue of the RSA cryptosystem.
- Published in:
- Bulletin of the Australian Mathematical Society, 2003, v. 68, n. 1, p. 21, doi. 10.1017/S0004972700037382
- By:
- Publication type:
- Article
Differential power analysis resistant hardware implementation of the RSA cryptosystem.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2010, v. 18, n. 1, p. 129, doi. 10.3906/elk-0904-4
- By:
- Publication type:
- Article
A New Attack on the RSA Cryptosystem Based on Continued Fractions.
- Published in:
- Malaysian Journal of Mathematical Sciences, 2017, v. 11, p. 45
- By:
- Publication type:
- Article
An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2020, v. 30, n. 15, p. N.PAG, doi. 10.1142/S0218127420502338
- By:
- Publication type:
- Article
Variants of RSA and Rabin Cryptosystems modulo p<sup>r</sup>q<sup>s</sup>.
- Published in:
- Ganit: Journal of Bangladesh Mathematical Society, 2024, v. 44, n. 2, p. 1, doi. 10.3329/ganit.v44i2.78527
- By:
- Publication type:
- Article
Hardware performance analysis of RSA cryptosystems on FPGA for wireless sensor nodes.
- Published in:
- International Journal of Intelligent Networks, 2021, v. 2, p. 184, doi. 10.1016/j.ijin.2021.09.008
- By:
- Publication type:
- Article
New Variant MultiPrime Jordon Totient--RSA Cryptosystem with one Public key and two Private Keys.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 576
- By:
- Publication type:
- Article
Variants of Public Key Cryptosystem RSA.
- Published in:
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 3, p. 219
- By:
- Publication type:
- Article
EFFICIENT RSA CRYPTOSYSTEM DECRYPTION BASED ON CHINESE REMAINDER THEOREM AND STRONG PRIME.
- Published in:
- Annals. Computer Science Series, 2017, v. 15, n. 2, p. 43
- By:
- Publication type:
- Article
A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem.
- Published in:
- International Journal of Business Data Communications & Networking, 2017, v. 13, n. 1, p. 74, doi. 10.4018/IJBDCN.2017010107
- By:
- Publication type:
- Article
Integer factorization for RSA cryptosystem under a PVM environment.
- Published in:
- Computer Systems Science & Engineering, 2007, v. 22, n. 1/2, p. 25
- By:
- Publication type:
- Article
SOFTWARE/HARDWARE CO-DESIGN OF MODULAR EXPONENTIATION FOR EFFICIENT RSA CRYPTOSYSTEM.
- Published in:
- Journal of Circuits, Systems & Computers, 2014, v. 23, n. 3, p. -1, doi. 10.1142/S0218126614500327
- By:
- Publication type:
- Article
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations.
- Published in:
- Lietuvos Matematikos Rinkinys, 2023, v. 64, n. Series A, p. 25, doi. 10.15388/LMR.2023.33590
- By:
- Publication type:
- Article
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.
- Published in:
- Baghdad Science Journal, 2024, v. 21, n. 1, p. 151, doi. 10.21123/bsj.2023.8361
- By:
- Publication type:
- Article
Cryptanalysis of RSA-Variant Cryptosystem Generated by Potential Rogue CA Methodology.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 8, p. 1498, doi. 10.3390/sym14081498
- By:
- Publication type:
- Article
Development of Modified RSA Cryptosystem via Octonion Algebra.
- Published in:
- International Journal of Mathematics & Computer Science, 2025, v. 20, n. 1, p. 459, doi. 10.69793/ijmcs/01.2025/hamza
- By:
- Publication type:
- Article
Implementing the RSA cryptosystem with Maxima CAS.
- Published in:
- Electronic Journal of Mathematics & Technology, 2012, v. 6, n. 1, p. 34
- By:
- Publication type:
- Article
Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 23, p. 1, doi. 10.1002/cpe.7187
- By:
- Publication type:
- Article
An efficient RSA cryptosystem by applying cuckoo search optimization algorithm.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 12, p. N.PAG, doi. 10.1002/cpe.4845
- By:
- Publication type:
- Article
Parallel implementation of the rsa public-key cryptosystem.
- Published in:
- International Journal of Computer Mathematics, 1993, v. 48, n. 3/4, p. 153, doi. 10.1080/00207169308804198
- By:
- Publication type:
- Article
An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2020, v. 10, n. 1, p. 530, doi. 10.11591/ijece.v10i1.pp530-537
- By:
- Publication type:
- Article
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 5, p. 3949, doi. 10.11591/ijece.v8i5.pp3949-3953
- By:
- Publication type:
- Article
Finding small solutions of the equation Bx−Ay = z and its applications to cryptanalysis of the RSA cryptosystem.
- Published in:
- Advances in Mathematics of Communications, 2021, v. 15, n. 3, p. 441, doi. 10.3934/amc.2020076
- By:
- Publication type:
- Article
Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.
- Published in:
- Entropy, 2023, v. 25, n. 11, p. 1478, doi. 10.3390/e25111478
- By:
- Publication type:
- Article
SECURE RSA CRYPTOSYSTEM BASED ON MULTIPLE KEYS.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2021, v. 13, n. 3, p. 25, doi. 10.29304/jqcm.2021.13.3.824
- By:
- Publication type:
- Article
An Efficient RSA Based Key Authenticated Prime Fibonacci Cryptosystem.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 1, p. 300
- By:
- Publication type:
- Article
Generalization of RSA cryptosystem based on 2n primes.
- Published in:
- AIMS Mathematics, 2023, v. 8, n. 8, p. 1, doi. 10.3934/math.2023958
- By:
- Publication type:
- Article
Modification of Traditional RSA into Symmetric-RSA Cryptosystems.
- Published in:
- International Journal of Business Data Communications & Networking, 2017, v. 13, n. 1, p. 66, doi. 10.4018/IJBDCN.2017010106
- By:
- Publication type:
- Article
A novel multiple image encryption technique based on asymmetric cryptosystem with HCM in frequency domain.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 29, p. 72253, doi. 10.1007/s11042-024-18347-0
- By:
- Publication type:
- Article
A New Attack on Special-Structured RSA Primes.
- Published in:
- Malaysian Journal of Mathematical Sciences, 2019, v. 13, n. S, p. 111
- By:
- Publication type:
- Article
A variant of Wiener’s attack on RSA.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 77, doi. 10.1007/s00607-009-0037-8
- By:
- Publication type:
- Article
可动态更新的口令授权多秘密共享方案.
- Published in:
- Computer Engineering & Science / Jisuanji Gongcheng yu Kexue, 2019, v. 41, n. 9, p. 1597, doi. 10.3969/j.issn.1007-130X.2019.09.010
- By:
- Publication type:
- Article
A New LSB Attack on Special-Structured RSA Primes.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 5, p. 838, doi. 10.3390/sym12050838
- By:
- Publication type:
- Article
An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.
- Published in:
- Journal of Medical Systems, 2015, v. 39, n. 8, p. 1, doi. 10.1007/s10916-015-0262-y
- By:
- Publication type:
- Article
Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA.
- Published in:
- ETRI Journal, 2010, v. 32, n. 1, p. 102, doi. 10.4218/etrij.10.0109.0249
- By:
- Publication type:
- Article
RSA-type Algebra Structures.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 6, p. 2835, doi. 10.3837/tiis.2016.06.021
- By:
- Publication type:
- Article
An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation.
- Published in:
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 353, doi. 10.1080/10798587.2015.1118909
- By:
- Publication type:
- Article