Forty years of attacks on the RSA cryptosystem: A brief survey

M Mumtaz, L Ping - Journal of Discrete Mathematical Sciences and …, 2019 - Taylor & Francis
RSA public key cryptosystem is the de-facto standard use in worldwide technologies as a
strong encryption/decryption and digital signature scheme. RSA successfully defended forty …

An analysis of leading lattice-based asymmetric cryptographic primitives

C Easttom - 2019 IEEE 9th Annual Computing and …, 2019 - ieeexplore.ieee.org
Cryptographic primitives have been constructed on a wide range of mathematical basis. For
asymmetric cryptography, those bases are problems in number theory. Lattice based …

[HTML][HTML] Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution

E Setyaningsih, R Wardoyo, AK Sari - Digital Communications and …, 2020 - Elsevier
There are a few issues related to the existing symmetric encryption models for color image
data, such as the key generation and distribution problems. In this paper, we propose a …

Design and implementation of Rivest Shamir Adleman's (RSA) cryptography algorithm in text file data security

HT Sihotang, S Efendi, EM Zamzami… - Journal of Physics …, 2020 - iopscience.iop.org
Security of data text file on a computer can be done by utilizing encryption and decryption
techniques. One technique is encryption and decryption of data encryption system text file …

A real-time blockchain-based multifunctional integrated smart metering system

F Mohammadi, M Sanjari, M Saif - 2022 IEEE kansas power …, 2022 - ieeexplore.ieee.org
As the backbone of the smart grid, smart metering systems enable customers, as well as
utility companies, to have access to real-time information on consumption patterns in …

TD2SecIoT: temporal, data-driven and dynamic network layer based security architecture for industrial IoT

D Dejene, B Tiwari, V Tiwari - IJIMAI, 2020 - dialnet.unirioja.es
Resumen The Internet of Things (IoT) is an emerging technology, which comprises wireless
smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart …

A real-time blockchain-based state estimation system for battery energy storage systems

F Mohammadi, M Sanjari, M Saif - 2022 IEEE Kansas power …, 2022 - ieeexplore.ieee.org
The main roles of an advanced Battery Management System (BMS) are to dynamically
monitor the battery packs and ensure the efficiency and reliability of the Battery Energy …

Small private exponent attacks on RSA using continued fractions and multicore systems

HM Bahig, DI Nassr, MA Mahdi, HM Bahig - Symmetry, 2022 - mdpi.com
The RSA (Rivest–Shamir–Adleman) asymmetric-key cryptosystem is widely used for
encryptions and digital signatures. Let (n, e) be the RSA public key and d be the …

A security analysis of two classes of RSA-like cryptosystems

P Cotan, G Teşeleanu - Journal of Mathematical Cryptology, 2024 - degruyter.com
Let N= pq be the product of two balanced prime numbers p and q. In Elkamchouchi et
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …

Cryptanalysis of the RSA variant based on cubic Pell equation

M Zheng, N Kunihiro, Y Yao - Theoretical Computer Science, 2021 - Elsevier
Abstract RSA (Rivest-Shamir-Adleman) cryptosystem is the most popular asymmetric key
cryptographic algorithm used in computer science and information security. Recently, an …