Modified RSA-based algorithm: A double secure approach
I Al_Barazanchi, SA Shawkat… - TELKOMNIKA …, 2019 - telkomnika.uad.ac.id
Security algorithms like RSA are becoming increasingly important for communications to
provide companies, organizations, and users around the world, secure applications who rely …
provide companies, organizations, and users around the world, secure applications who rely …
Residue number system asymmetric cryptoalgorithms
YM Nykolaychuk, IZ Yakymenko, NY Vozna… - … and Systems Analysis, 2022 - Springer
Theoretical foundations of asymmetric encryption based on the residue number system and
its modified perfect form are developed. The moduli of the residue number system are …
its modified perfect form are developed. The moduli of the residue number system are …
Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds
With the rapid development of cloud advancement, a data security challenge has emerged.
In this paper, a technique based on elliptical cryptography and cuckoo search algorithm is …
In this paper, a technique based on elliptical cryptography and cuckoo search algorithm is …
[PDF][PDF] An improved secured cloud data using dynamic Rivest-Shamir-Adleman key
Encryption methods had been widely used for secure data transmission and communication
in both public and private organizations against intruders. Rivest-shamir-adleman (RSA) …
in both public and private organizations against intruders. Rivest-shamir-adleman (RSA) …
Scalable security based on data classification using generalized RSA in cloud storage
A Khalique, I Hussain, M Afshar Alam… - Proceedings of ICETIT …, 2020 - Springer
In cloud environment, huge amount of data is stored in data centers. These data are
generated from numerous sources such as social media, social networking and others …
generated from numerous sources such as social media, social networking and others …
[PDF][PDF] Eight Prime Numbers of Modified RSA Algorithm Method for More Secure Single Board Computer Implementation
NTE Hermawan, E Winarko… - International Journal on …, 2021 - researchgate.net
RSA is the most popular public-key cryptography. The main strength of the algorithm is
based on the difficulty of factoring in a large integer number. RSA has also been applied in a …
based on the difficulty of factoring in a large integer number. RSA has also been applied in a …
On the insecurity of generalized (Rivest-Shamir-Adleman)-advance and adaptable cryptosystem
This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman)-
Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA …
Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA …
АСИМЕТРИЧНІ АЛГОРИТМИ ШИФРУВАННЯ У СИСТЕМІ ЗАЛИШКОВИХ КЛАСІВ.
ЯМ Николайчук, І ЯКИМЕНКО… - … & Systems Analysis …, 2022 - search.ebscohost.com
Розроблено теоретичні основи асиметричного шифрування на базі системи залишкоr
вих класів та¿¿ модифіковано¿ досконало¿ форми. При цьому модулі системи …
вих класів та¿¿ модифіковано¿ досконало¿ форми. При цьому модулі системи …
ASİMETRİK ŞİFRELEMEDE ASAL SAYILAR VE GÜVENLİK
T Yerlikaya, N İşçimen - Trakya Üniversitesi Mühendislik Bilimleri …, 2023 - dergipark.org.tr
Güvenli olmayan bir ağ ortamında verileri gizlemek ve transferini sağlamak için şifreleme
kripto sistemleri kullanılır. Asimetrik şifreleme kriptosistemlerinde verinin güvenle …
kripto sistemleri kullanılır. Asimetrik şifreleme kriptosistemlerinde verinin güvenle …
A novel scheme for image authentication and secret data sharing
Privacy protection is of extreme importance especially in security sensitive environments.
Neither cryptography nor steganography comes up with ultimate solution for privacy …
Neither cryptography nor steganography comes up with ultimate solution for privacy …