Systematic and critical review of rsa based public key cryptographic schemes: Past and present status

R Imam, QM Areeb, A Alturki, F Anwer - IEEE access, 2021 - ieeexplore.ieee.org
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …

Modified RSA-based algorithm: A double secure approach

I Al_Barazanchi, SA Shawkat… - TELKOMNIKA …, 2019 - telkomnika.uad.ac.id
Security algorithms like RSA are becoming increasingly important for communications to
provide companies, organizations, and users around the world, secure applications who rely …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

RSA Cryptographic Algorithm using Cubic Congruential Generator

N Khairina, MK Harahap - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
In the field of cryptography, the key and procedures for converting messages into secret
messages have a very important role. The RSA key is built with a random number generator …

[PDF][PDF] An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem

YK Kumar, RM Shafi - International Journal of Electrical and …, 2020 - academia.edu
Cloud Computing is the ability to improve the utility or train new human resources without
investing in new infrastructure, or add capabilities to existence without the latest software …

A Note on the Computation of the Modular Inverse for Cryptography

M Bufalo, D Bufalo, G Orlando - Axioms, 2021 - mdpi.com
In literature, there are a number of cryptographic algorithms (RSA, ElGamal, NTRU, etc.) that
require multiple computations of modulo multiplicative inverses. In this paper, we describe …

An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA

C Zhang, Y Liang, A Tavares, L Wang, T Gomes… - Symmetry, 2024 - mdpi.com
Due to its very desirable properties, Chebyshev polynomials are often used in the design of
public key cryptographic systems. This paper discretizes the Chebyshev mapping …

Some Properties of the Computation of the Modular Inverse with Applications in Cryptography

M Bufalo, D Bufalo, G Orlando - Computation, 2023 - mdpi.com
In the field of cryptography, many algorithms rely on the computation of modular
multiplicative inverses to ensure the security of their systems. In this study, we build upon our …

Preserving Confidentiality against Factorization Attacks using Fake Modulus () Approach in RSA and its Security Analysis

BR Puneeth, KR Raghunandan… - 2022 IEEE 9th Uttar …, 2022 - ieeexplore.ieee.org
In today's world, the most vital feature is the security of shared information. To achieve this,
various algorithms are offered in cryptosystems, with RSA being one among them. RSA is a …

Methods toward enhancing RSA algorithm: a survey

SS Al-Kaabi - Available at SSRN 3819524, 2019 - papers.ssrn.com
Cryptography defines different methods and technologies used in ensuring communication
between two parties over any communication medium is secure, especially in presence of a …