Search Results - ((((rsa algorithm) OR (tree algorithm))) OR (based algorithm))
Search alternatives:
- tree algorithm »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
3
Enhancement of RSA Key Generation Using Identity
Published 2015“…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
5
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Hence, how to make a more efficient and faster implementation of Rivest Shamir Adleman algorithm (RSA) is a great concern to researchers in the field of cryptography. …”
Get full text
Get full text
Get full text
Article -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting.…”
Get full text
Get full text
Article -
8
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
9
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
10
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000“…The hardware implementation of the RSA algorithm for public-key cryptography is presented. …”
Get full text
Get full text
Article -
12
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
13
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
14
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, AES-128 gives higher confidentiality compared to RSA-2048 and it will be most suitable encryption algorithm to be implemented in the TCP protocol.…”
Get full text
Get full text
Thesis -
15
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
16
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…Lentras attack and faults based attack. Most of these attacks have shown that the LUCU1 cryptosystem is secure than RSA, LUe and LUC3 cryptosystems. …”
Get full text
Get full text
Thesis -
17
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…This technique can find out the 3.851273 bits per base of the compression rate. The O(n) is the complexity of this algorithm. …”
Get full text
Get full text
Get full text
Article -
18
New directions in factoring the prime power RSA modulus N = prq
Published 2016“…We utilized the LLL algorithm on k Prime Power RSA public keys (Ni, ei) with Ni = prꜟqꜟ and we were able to factorize the k Prime Power RSA moduli Ni = prꜟqꜟ simultaneously in polynomial time.…”
Get full text
Get full text
Conference or Workshop Item -
19
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…It is one of the dominant parts of algorithms for key exchange, electronic signatures and authentication in cryptography. …”
Get full text
Get full text
Research Reports -
20
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Mathematical analysis is carried out to identify important features, advantages and disadvantages of the new signed-digit {0,1,3}-NAF scalar multiplication algorithm. Cost measurement is based on number of point operations per scalar throughout the execution of the scalar multiplication algorithm. …”
Get full text
Get full text
Thesis
