Search

Your search keyword '"RSA algorithm"' showing total 26 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Publisher ieee Remove constraint Publisher: ieee
26 results on '"RSA algorithm"'

Search Results

1. A Study of Cryptographic Algorithms on Special Linear Group Over Ring of Integers Modulo m

2. Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography.

3. Multi-Dimensional Privacy-Preserving Average Consensus in Wireless Sensor Networks.

4. A Time-/Frequency-Domain Side-Channel Attack Resistant AES-128 and RSA-4K Crypto-Processor in 14-nm CMOS.

5. Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications.

6. Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.

7. Efficient and Secure Location-Based Services Scheme in VANET.

8. Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.

9. Embedding Digital Signature Using Encrypted-Hashing for Protection of DSP Cores in CE.

10. A Reflection Symmetry Approximation of Multilook Polarimetric SAR Data and its Application to Freeman–Durden Decomposition.

11. FFT-Based McLaughlin's Montgomery Exponentiation without Conditional Selections.

12. Secure MIMO Visible Light Communication System Based on User's Location and Encryption.

13. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy.

14. Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication.

15. Image steganography in DWT domain using double-stegging with RSA encryption.

16. Dynamic router selection and encryption for data secure in Wireless Sensor Networks.

17. Data security in cloud using RSA.

18. Loop-based RSA key generation algorithm using string identity.

19. Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes.

20. Secure energy-aware multipath routing protocol with transmission range adjustment for wireless sensor networks.

21. Research on Multiple-Exponent Single-Data attack on RSA cipher circuits.

22. A method on safe data transmission with lossless compression.

23. Research on Single-Exponent Multiple-Data attack on RSA cipher circuits.

25. Generalized Ring Signatures.

26. Modified Integer Factorization Algorithm Using V-Factor Method.

Catalog

Books, media, physical & digital resources