Forty years of attacks on the RSA cryptosystem: A brief survey
M Mumtaz, L Ping - Journal of Discrete Mathematical Sciences and …, 2019 - Taylor & Francis
RSA public key cryptosystem is the de-facto standard use in worldwide technologies as a
strong encryption/decryption and digital signature scheme. RSA successfully defended forty …
strong encryption/decryption and digital signature scheme. RSA successfully defended forty …
An analysis of leading lattice-based asymmetric cryptographic primitives
C Easttom - 2019 IEEE 9th Annual Computing and …, 2019 - ieeexplore.ieee.org
Cryptographic primitives have been constructed on a wide range of mathematical basis. For
asymmetric cryptography, those bases are problems in number theory. Lattice based …
asymmetric cryptography, those bases are problems in number theory. Lattice based …
[HTML][HTML] Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
E Setyaningsih, R Wardoyo, AK Sari - Digital Communications and …, 2020 - Elsevier
There are a few issues related to the existing symmetric encryption models for color image
data, such as the key generation and distribution problems. In this paper, we propose a …
data, such as the key generation and distribution problems. In this paper, we propose a …
Design and implementation of Rivest Shamir Adleman's (RSA) cryptography algorithm in text file data security
Security of data text file on a computer can be done by utilizing encryption and decryption
techniques. One technique is encryption and decryption of data encryption system text file …
techniques. One technique is encryption and decryption of data encryption system text file …
A real-time blockchain-based multifunctional integrated smart metering system
As the backbone of the smart grid, smart metering systems enable customers, as well as
utility companies, to have access to real-time information on consumption patterns in …
utility companies, to have access to real-time information on consumption patterns in …
TD2SecIoT: temporal, data-driven and dynamic network layer based security architecture for industrial IoT
Resumen The Internet of Things (IoT) is an emerging technology, which comprises wireless
smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart …
smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart …
A real-time blockchain-based state estimation system for battery energy storage systems
The main roles of an advanced Battery Management System (BMS) are to dynamically
monitor the battery packs and ensure the efficiency and reliability of the Battery Energy …
monitor the battery packs and ensure the efficiency and reliability of the Battery Energy …
Small private exponent attacks on RSA using continued fractions and multicore systems
The RSA (Rivest–Shamir–Adleman) asymmetric-key cryptosystem is widely used for
encryptions and digital signatures. Let (n, e) be the RSA public key and d be the …
encryptions and digital signatures. Let (n, e) be the RSA public key and d be the …
A security analysis of two classes of RSA-like cryptosystems
P Cotan, G Teşeleanu - Journal of Mathematical Cryptology, 2024 - degruyter.com
Let N= pq be the product of two balanced prime numbers p and q. In Elkamchouchi et
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …
al.(Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian …
Cryptanalysis of the RSA variant based on cubic Pell equation
Abstract RSA (Rivest-Shamir-Adleman) cryptosystem is the most popular asymmetric key
cryptographic algorithm used in computer science and information security. Recently, an …
cryptographic algorithm used in computer science and information security. Recently, an …