Systematic and critical review of rsa based public key cryptographic schemes: Past and present status

R Imam, QM Areeb, A Alturki, F Anwer - IEEE access, 2021 - ieeexplore.ieee.org
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

Enhanced RSA algorithm with varying key sizes for data security in cloud

IG Amalarethinam, HM Leena - 2017 World Congress on …, 2017 - ieeexplore.ieee.org
Cloud Computing is a distributed and centralized network of inter connected and inter
related systems with one or more IT resources provisioned based on pay-on-demand usage …

An empirical study of secure and complex variants of RSA scheme

R Imam, F Anwer - Cyber Security, Privacy and Networking: Proceedings …, 2022 - Springer
In today's cyber space, where large amounts of data are being exchanged and stored on
remote storages, Cryptography plays a major role. Public key cryptography such as RSA is …

The AWG|| PSC network: a performance-enhanced single-hop WDM network with heterogeneous protection

C Fan, M Maier, M Reisslein - Journal of lightwave technology, 2004 - opg.optica.org
Single-hop wavelength-division-multiplexing (WDM) networks based on a central passive
star coupler (PSC) or arrayed-waveguide grating (AWG) hub have received a great deal of …

Secure Encryption Framework for Multi-Cloud Environments: Leveraging Symmetric and Asymmetric Encryption

TV Reddy, BLN Murthy, JS Bhagavan… - 2023 7th …, 2023 - ieeexplore.ieee.org
Data encryption is the process of turning data into encrypted data. It is a crucial technology
for securing data while it is being stored or transmitted, especially in cloud environments …

Multimodal biometrics security system for authentication

A Maheshwari… - 2016 Second International …, 2016 - ieeexplore.ieee.org
Recently biometrics based authentication system provides security from attacks. This paper
presents to implement the biometric system based on the combination of graphical image …

Chi-Squared Test Analysis on Hybrid Cryptosystem

NH Munshi, P Das, S Maitra - Micro and Nanosystems, 2022 - benthamdirect.com
Nowadays, the internet has reached every aspect of our day-to-day life. The idea of
cryptography is to provide security. It is an encryption technique used for network security …

[PDF][PDF] Enhanced RSA algorithm for data security in cloud

DIG Amalarethinam, HM Leena - International Journal of Control …, 2016 - researchgate.net
In the new era of Computing, the possibility of provisioning resources like operating system,
computing power, memory space, software, platform, etc., on the basis of pay-on-demand …

Digital Signature Algorithm: A Hybrid Approach

HN Prajwal - … Journal of Advanced Computer Science and …, 2023 - search.proquest.com
Security is one of the most important issues in layout of a Digital System. Communication
these days is digital. Consequently, utmost care must be taken to secure the information …