Showing 1 - 20 results of 95 for search '"RSA (algorithm)"', query time: 0.11s Refine Results
  1. 1

    ACTIVE NETWORK SECURITY BASED RSA ALGORITHM by Ahmed Freidoon Fadhil, Wisam haitham abbood

    Published 2009-12-01
    “…The proposed system depends on the basic concepts (authentication and authorization) and uses RSA algorithm to add additional level of security. The proposed system also depends on active packet architecture, the packet will represented in the active node as input, and when the packet is retransmitted to another active node it carries information about each node it visits. …”
    Get full text
    Article
  2. 2
  3. 3

    Enhancement of System Security by Using LSB and RSA Algorithms by Muna M. Hummady, Ameer Hussein Morad

    Published 2022-03-01
    “…In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography. …”
    Get full text
    Article
  4. 4

    Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm by Mengjiao Quan, Qiang Jin, Bin Ba, Jin Zhang, Chunxiao Jian

    Published 2022-10-01
    “…The specific method is to first use the asymmetric RSA algorithm to transmit the system parameters, then to use the initial value sensitivity of the chaotic sequence to generate the secret sequence, and finally to use the secret sequence to encrypt the original sequence. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm by Shaikh, Muhammad Umair, Wan Adnan, Wan Azizun, Ahmad, Siti Anom

    Published 2020
    “…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
    Get full text
    Article
  8. 8

    RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol by Aminudin Aminudin, Gadhing Putra Aditya, Sofyan Arifianto

    Published 2020-04-01
    “…This study aims to analyze the performance and security of the RSA algorithm in combination with the key generation method of enhanced and secured RSA key generation scheme (ESRKGS). …”
    Get full text
    Article
  9. 9

    An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA) by Falowo O. Mojisola, Sanjay Misra, C. Falayi Febisola, Olusola Abayomi-Alli, Gokhan Sengul

    Published 2022-07-01
    “…The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. …”
    Get full text
    Article
  10. 10

    Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat by Aminudin, Ilyas Nuryasin

    Published 2021-08-01
    Subjects: “…rsa algorithm, dual modulus rsa, kraitchik factorization…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    The Design of a Safe Charging System Based on PKS Architecture by Jianhong Zeng, Yi Zhang, Youhua Xue, Wenqi Li, Jing Li, Linchao Zhang, Shipu Zheng

    Published 2022-10-01
    Subjects: “…Rivest Shamir Adleman (RSA) algorithm…”
    Get full text
    Article
  19. 19

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.…”
    Get full text
    Get full text
    Article
  20. 20

    Mechanical engineering design optimization using reptile search algorithm by Milenković Branislav, Jovanović Đorđe, Krstić Mladen

    Published 2022-01-01
    “…In this paper we have demonstrated how the Reptile Search Algorithm (RSA) algorithm is able to solve classical engineering design problems. …”
    Get full text
    Article