Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "RSA algorithm"

ADD TO MY LIST
 
RSA: Dagli anni '70 al giorno d'oggi

Author(s): Pellegrini, S
Study of RSA and Proposed Variant against Wiener’s Attack

Author(s): Justin Jose | Siddharth Raina | Sushant Pawar | Shriket Pai
A New Multisignature Scheme Using Re-Encryption Technique

Author(s): Sattar J. Aboud | Mohammed A. AL-Fayoumi
Study on the Multiple-Key-Pair Generation Scheme Based on Grey Half-generation

Author(s): Peng Li | Yulian Shang | Jifeng Wang | Yufei Zhang
Weak Composite Diffie-Hellman

Author(s): Kooshiar Azimian | Javad Mohajeri | Mahmoud Salmasizadeh
A new approach for three component seismic array processing

Author(s): O. K. Kedrov | V. E. Permyakova
FPGA Implementation of RSA Encryption System

Author(s): Sushanta Kumar Sahu | Manoranjan Pradhan
Reducing Computational Time of Basic Encryption and Authentication Algorithms

Author(s): Sandeep Kumar, | Gautam Kumar, | Navjot Singh
Frame Based Symmetric Key Cryptography

Author(s): Uttam Kr. Mondal | Satyendra Nath Mandal | J. PalChoudhury | J.K.Mandal
Parallel Key Encryption for CBC and Interleaved CBC

Author(s): S.Ashokkumar | K.Karuppasamy | Balaji Srinivasan | V.Balasubramanian
Cryptanalysis of Koyama Scheme

Author(s): Sahadeo Padhye
Accelerating RSA Encryption Using Random Precalculations

Author(s): Loránd Szőllősi | Tamás Marosits | Gábor Fehér
Design of a Novel Cryptographic Algorithm using Genetic Functions

Author(s): Praneeth Kumar G and Vishnu Murthy G
Generalisation of RSA Scheme using fundamental groups and ZKIP

Author(s): S.Samundeeswari, | M.Thiyagarajan
A new encryption and signing algorithm

Author(s): Urszula Romañczuk
A Different Text Attack Algorithm in Integer Factoring Based Schemes

Author(s): Mohammed A. AL-Fayoumi | Sattar J. Aboud | Musbah M. Aqel
Hybrid Compression Encryption Technique for Securing SMS

Author(s): Ahmed M Mahfouz | Awny A. Ahmed | Bahgat A. Abdel-latef | Tarek
DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS

Author(s): Dr.S.Subasree and Dr.N.K.Sakthivel
Editorial

Author(s): Li Ming | Mingwen Wang | Deng-Yi Zhang | Chin-Chen Chang | Fei Yu
A Robust Framework for Protecting Computation Results of Mobile Agents

Author(s): Abid Khan | Xiamu Niu | Zhang Yong
Replicated R-Resilient Process Allocation for Load Distribution in Fault Tolerant System

Author(s): Jian Wang | Jianling Sun | xinyu Wang | Hang Chen
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme

Author(s): Fang-Ping Chiang | Yi-Mien Lin | Ya-Fen Chang
Authentication Protocol Using Quantum Superposition States

Author(s): Yoshito Kanamori | Seong-Moo Yoo | Don A. Gregory | Frederick T. Sheldon
Knapsack Based ECC Encryption and Decryption

Author(s): R. Rajaram Ramasamy | M. Amutha Prabakar | M. Indra Devi | M. Suguna
Neural Network Based Classification and Diagnosis of Brain Hemorrhages

Author(s): K.V.Ramana M.Tech | Raghu Korrpati
Biometrics Based File Transmission Using RSA Cryptosystem

Author(s): Cryptography, Biometrics, RSA, DSS, KDC
Securing MMS with High Performance Elliptic Curve Cryptography

Author(s): B. N. Jagdale | R.K.Bedi | Sharmishta Desai
Key-Management Systems in Vehicular Ad-Hoc Networks

Author(s): Sasikumar P | Vivek C | Jayakrishnan P
SECURE TRANSMISSION OF DATA USING CRT-RSA

Author(s): V. Senthil Balaji
A Novel Digital Envelope Approach for A Secure E-Commerce Channel

Author(s): Ramachandran Ganesan | Mohan Gobi | Kanniappan Vivekanandan
A Bit-Serial Multiplier Architecture for Finite Fields Over Galois Fields

Author(s): Hero Modares | Yasser Salem | Rosli Salleh | Majid T. Shahgoli
Low-complexity chaotic encryption system

Author(s): R. Hasimoto Beltrán
Evidence based Access Control over Web Services using Multi Security

Author(s): E. S. Shameem Sulthana | S. Kanmani
Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

Author(s): Mohamed Hamdy Eldefrawy | Muhammad Khurram Khan | Khaled Alghathbar | Ahmed Saleh Tolba | Kyngn Jung Kim
DNA-based watermarks using the DNA-Crypt algorithm

Author(s): Heider Dominik | Barnekow Angelika
Analysis of Software Realized DSA Algorithm for Digital Signature

Author(s): Bojan R. Pajčin | Predrag N. Ivaniš
A NEW VARIANT OF SUBSET-SUM CRYPTOSYSTEM OVER RSA

Author(s): Sonal Sharma | Saroj Hiranwal | Prashant Sharma
DNA Computing based Elliptic Curve Cryptography

Author(s): P. Vijayakumar | V. Vijayalakshmi | G. Zayaraz
A Comparitive Study of Cryptosystems with Elliptic Curve Cryptography using Digital Signature

Author(s): Shipra Shukla | Dharmendra Lal Gupta | Anil Kumar Malviya
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS

Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION

Author(s): Shaik Rasool | G. Sridhar | K. Hemanth Kumar | P. Ravi Kumar
Components Based Key Management Algorithm for Storage Area Networks

Author(s): P. Mahalingam | Dr. N. Jayaprakash | Dr. S. Karthikeyan
A RSA Key Security Gradating Algorithm Based on Threshold Attack Time

Author(s): Wenxue Tan | Jinju Xi | Xiping Wang
Development of Enhanced Token using Picture Password and Public Key Infrastructure Mechanism for Digital Signature

Author(s): Oghenerukevwe E. Oyinloye | Ayodeji .I. Fasiku | Boniface K.Alese | Akinbohun Folake
Enhanced Fast and Secure Hybrid Encryption Algorithm for Message Communication

Author(s): Shaik Rasool | Md Ateeq ur Rahman | G. Sridhar | K. Hemanth Kunar
High Dynamic Range RNS Bases for Modular Multiplication

Author(s): Shirin Rezaie | Mohammad Esmaeildoust | Marzieh Gerami | Keivan Navi | Omid Hashemipour
A Novel Elliptic curve cryptography Processor using NoC design

Author(s): Hamid Javashi | Reza Sabbaghi-Nadooshan
A Fast Approach for Breaking RSA Cryptosystem

Author(s): Alaa H Al-Hamami | Bilal S O Al-Kubaysee
Architectural Analysis of RSA Cryptosystem on FPGA

Author(s): Vibhor Garg | V. Arunachalam
An Enhancement of Security on Image Applying Asymmetric Key Algorithm

Author(s): Sabyasachi Samanta | Saurabh Dutta | Gautam Sanyal
Study of Performance Analysis in Wired and Wireless Network

Author(s): V. B. Kirubanand | S. Palaniammal
Single Core Hardware Module to Implement Partial Encryption of Compressed Image

Author(s): Mamun B.I. Reaz | M. S. Amin | Fazida H. Hashim | K Asaduzzaman
Probabilistic Encryption Based ECC Mechanism

Author(s): Addepalli V.N. Krishna
A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation

Author(s): Saiful Islam Chowdhury | Shoyeb Al Mamun Shohag | Hasan Sahid
Secure Routing Scheme in MANETs using Secret Key Sharing

Author(s): A. Amuthan | B.Aravind Baradwaj
Efficiency Analysis for Public Key Systems Based on Fractal Functions

Author(s): Nadia M.G. AL-Saidi | Mohamad R.M. Said | Adil M. Ahmed
Artificial Neural Network Approach in Radar Target Classification

Author(s): N. K. Ibrahim | R. S.A.R. Abdullah | M. I. Saripan
Why do you need a reservation system?      Affiliate Program