-
1
ACTIVE NETWORK SECURITY BASED RSA ALGORITHM
Published 2009-12-01“…The proposed system depends on the basic concepts (authentication and authorization) and uses RSA algorithm to add additional level of security. The proposed system also depends on active packet architecture, the packet will represented in the active node as input, and when the packet is retransmitted to another active node it carries information about each node it visits. …”
Get full text
Article -
2
-
3
Enhancement of System Security by Using LSB and RSA Algorithms
Published 2022-03-01“…In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography. …”
Get full text
Article -
4
Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm
Published 2022-10-01“…The specific method is to first use the asymmetric RSA algorithm to transmit the system parameters, then to use the initial value sensitivity of the chaotic sequence to generate the secret sequence, and finally to use the secret sequence to encrypt the original sequence. …”
Get full text
Article -
5
ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS
Published 2021-07-01Subjects: Get full text
Article -
6
Computational ghost imaging encryption using RSA algorithm and discrete wavelet transform
Published 2024-01-01Subjects: Get full text
Article -
7
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Article -
8
RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol
Published 2020-04-01“…This study aims to analyze the performance and security of the RSA algorithm in combination with the key generation method of enhanced and secured RSA key generation scheme (ESRKGS). …”
Get full text
Article -
9
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)
Published 2022-07-01“…The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. …”
Get full text
Article -
10
Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat
Published 2021-08-01Subjects: “…rsa algorithm, dual modulus rsa, kraitchik factorization…”
Get full text
Article -
11
Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security
Published 2023-01-01Subjects: Get full text
Article -
12
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01Subjects: Get full text
Article -
13
On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
Published 2024-02-01Subjects: Get full text
Article -
14
Apriori Method of Mining Secure Data in Social Media
Published 2019-08-01Subjects: Get full text
Article -
15
Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption
Published 2023-03-01Subjects: Get full text
Article -
16
Some Properties of the Computation of the Modular Inverse with Applications in Cryptography
Published 2023-03-01Subjects: Get full text
Article -
17
A Note on the Computation of the Modular Inverse for Cryptography
Published 2021-06-01Subjects: Get full text
Article -
18
The Design of a Safe Charging System Based on PKS Architecture
Published 2022-10-01Subjects: “…Rivest Shamir Adleman (RSA) algorithm…”
Get full text
Article -
19
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.…”
Get full text
Get full text
Article -
20
Mechanical engineering design optimization using reptile search algorithm
Published 2022-01-01“…In this paper we have demonstrated how the Reptile Search Algorithm (RSA) algorithm is able to solve classical engineering design problems. …”
Get full text
Article