Search

Your search keyword '"RSA algorithm"' showing total 1,329 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm"
1,329 results on '"RSA algorithm"'

Search Results

1. Verifiable Quantum Advantage without Structure.

2. A secure and energy-efficient routing using coupled ensemble selection approach and optimal type-2 fuzzy logic in WSN.

3. FPGA design and implementation for montgomery multiplication algorithm using MATLAB HDL coder.

4. Construction of embedded online teaching platform based on AES-RSA encryption algorithm.

5. A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA.

6. Some Graph Based Encryption Techniques.

7. A Secure Image Cryptographic Algorithm Based on Triple Incorporated Ciphering Stages.

8. Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks.

9. Improving the RSA Encryption for Images by Introducing DNA Sequence Encoding.

10. Future Directions for Secure IoT Frameworks: Insights from Blockchain-Based Solutions: A Comprehensive Review and Future Analysis.

11. Encryption and decryption of signed graph matrices through RSA algorithm.

12. Mitigating blackhole attacks in wireless body area network.

13. A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security.

14. An Asymmetric Lossless Encryption Algorithm for Vector Maps Based on RSA.

15. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

16. A Study of Cryptographic Algorithms on Special Linear Group Over Ring of Integers Modulo m

17. Enhancing security in banking using novel lightweight security algorithm comparing with RSA algorithm.

18. Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm.

19. Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial.

20. Analysis of RSA and Shor's algorithm for cryptography: A quantum perspective.

21. Improving the success rate of quantum algorithm attacking RSA encryption system.

22. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.

23. Developing a secure voice recognition service on Raspberry Pi.

24. An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence.

25. A novel development to encrypt data communication under t-intuitionistic fuzzy environment.

26. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

27. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

28. Sustainable Business Models for Innovative Urban Mobility Services.

29. Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution.

30. Enhanced Elliptic Curve Cryptography (EECC).

31. A Review of Image Steganography Based on Multiple Hashing Algorithm.

32. Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization.

33. A novel on comparative data security analysis in public auditing for trusted cloud service with SSL encryption over RSA algorithm.

34. Analysis on improved scheme for reversible data hiding for encrypted images.

35. 5G enabled IoT network and security in healthcare.

36. A secured self-financial management application with RSA encryption technology.

37. Three-Tier approach to fortifying secure communication in Internet of vehicles networks

39. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

40. Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks.

41. Efficient Hybrid Encryption Algorithm for Securing Data in Cloud Environment.

42. Enhancing Parallel Implementation of RSA Algorithm using OpenMP.

43. Design of an Alternative to Polynomial Modified RSA Algorithm.

44. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

45. Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System.

46. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

47. FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS.

48. A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era.

49. Karatsuba Algorithm: Parallelization using CUDA.

50. Design of Data Encryption and Compression Methods.

Catalog

Books, media, physical & digital resources