Modified RSA-based algorithm: A double secure approach

I Al_Barazanchi, SA Shawkat… - TELKOMNIKA …, 2019 - telkomnika.uad.ac.id
Security algorithms like RSA are becoming increasingly important for communications to
provide companies, organizations, and users around the world, secure applications who rely …

Residue number system asymmetric cryptoalgorithms

YM Nykolaychuk, IZ Yakymenko, NY Vozna… - … and Systems Analysis, 2022 - Springer
Theoretical foundations of asymmetric encryption based on the residue number system and
its modified perfect form are developed. The moduli of the residue number system are …

Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds

A Malik, M Aggarwal, B Sharma, A Singh… - International Journal of …, 2020 - igi-global.com
With the rapid development of cloud advancement, a data security challenge has emerged.
In this paper, a technique based on elliptical cryptography and cuckoo search algorithm is …

[PDF][PDF] An improved secured cloud data using dynamic Rivest-Shamir-Adleman key

U Musa, MO Adebiyi, FB Osang, AA Adebiyi… - Indonesian Journal of …, 2024 - academia.edu
Encryption methods had been widely used for secure data transmission and communication
in both public and private organizations against intruders. Rivest-shamir-adleman (RSA) …

Scalable security based on data classification using generalized RSA in cloud storage

A Khalique, I Hussain, M Afshar Alam… - Proceedings of ICETIT …, 2020 - Springer
In cloud environment, huge amount of data is stored in data centers. These data are
generated from numerous sources such as social media, social networking and others …

[PDF][PDF] Eight Prime Numbers of Modified RSA Algorithm Method for More Secure Single Board Computer Implementation

NTE Hermawan, E Winarko… - International Journal on …, 2021 - researchgate.net
RSA is the most popular public-key cryptography. The main strength of the algorithm is
based on the difficulty of factoring in a large integer number. RSA has also been applied in a …

On the insecurity of generalized (Rivest-Shamir-Adleman)-advance and adaptable cryptosystem

MAM Isa, NNA Rahmany, MA Asbullah… - Journal of Physics …, 2019 - iopscience.iop.org
This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman)-
Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA …

АСИМЕТРИЧНІ АЛГОРИТМИ ШИФРУВАННЯ У СИСТЕМІ ЗАЛИШКОВИХ КЛАСІВ.

ЯМ Николайчук, І ЯКИМЕНКО… - … & Systems Analysis …, 2022 - search.ebscohost.com
Розроблено теоретичні основи асиметричного шифрування на базі системи залишкоr
вих класів та¿¿ модифіковано¿ досконало¿ форми. При цьому модулі системи …

ASİMETRİK ŞİFRELEMEDE ASAL SAYILAR VE GÜVENLİK

T Yerlikaya, N İşçimen - Trakya Üniversitesi Mühendislik Bilimleri …, 2023 - dergipark.org.tr
Güvenli olmayan bir ağ ortamında verileri gizlemek ve transferini sağlamak için şifreleme
kripto sistemleri kullanılır. Asimetrik şifreleme kriptosistemlerinde verinin güvenle …

A novel scheme for image authentication and secret data sharing

AH Lone, M Uddin - International Journal of Computer …, 2016 - search.proquest.com
Privacy protection is of extreme importance especially in security sensitive environments.
Neither cryptography nor steganography comes up with ultimate solution for privacy …