Systematic and critical review of rsa based public key cryptographic schemes: Past and present status
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …
unauthorized access. Advancement in technologies and new innovative methods applied by …
ACAFP: Asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm
P Chaudhury, S Dhang, M Roy, S Deb… - 2017 8th Annual …, 2017 - ieeexplore.ieee.org
RSA algorithm is used to hide and retrieve the data in an insecure network environment. The
advantage of RSA algorithm is to increase security and accessibility. The private keys never …
advantage of RSA algorithm is to increase security and accessibility. The private keys never …
An enhanced and secured RSA key generation scheme (ESRKGS)
M Thangavel, P Varalakshmi, M Murrali… - Journal of information …, 2015 - Elsevier
Public-key cryptography can be claimed as the greatest and an excellent revolution in the
field of cryptography. A public-key cryptosystem is used for both confidentiality and …
field of cryptography. A public-key cryptosystem is used for both confidentiality and …
Pell's RSA key generation and its security analysis
TC Segar, R Vijayaragavan - 2013 Fourth International …, 2013 - ieeexplore.ieee.org
In this paper, a new variant of RSA has been proposed whose key generation method is
distinct with the standard RSA. Generally the RSA family of variants can be applied at the …
distinct with the standard RSA. Generally the RSA family of variants can be applied at the …
[PDF][PDF] An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem
Cloud Computing is the ability to improve the utility or train new human resources without
investing in new infrastructure, or add capabilities to existence without the latest software …
investing in new infrastructure, or add capabilities to existence without the latest software …
[PDF][PDF] Modified RSA algorithm using two public key and Chinese remainder theorem
RS Abdeldaym, HM Abd Elkader… - IJ of Electronics and …, 2019 - ijeie.jalaxy.com.tw
Network security is an activity which is designed to protect the integrity and usability of the
data and network. In network security [14], the branch of cryptography is which one can save …
data and network. In network security [14], the branch of cryptography is which one can save …
[PDF][PDF] Analyzing the strength of Pell's RSA
By taking two distinct Diophantine equations with distinct large prime numbers and two
different co-ordinates, two secret keys are generated at the same time so that two users can …
different co-ordinates, two secret keys are generated at the same time so that two users can …
A-rsa: augmented rsa
Today, RSA algorithm is the most widely used public-key cryptosystem around the world. It is
used for security in everything from online shopping to cell phones. However, the basic RSA …
used for security in everything from online shopping to cell phones. However, the basic RSA …
Modified RSA cryptosystem based on offline storage and prime number
R Patidar, R Bhartiya - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
The most common public key algorithm is RSA cryptosystem used for encryption and
decryption. It is the first public key algorithm which provides security to transfer and saving of …
decryption. It is the first public key algorithm which provides security to transfer and saving of …
Secure MIMO visible light communication system based on user's location and encryption
Visible light communication systems are rapidly growing research areas with wide
applications ranging from illumination and data communication. To achieve high data rates …
applications ranging from illumination and data communication. To achieve high data rates …