4.6 Review

Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Mathematics, Applied

RM-RSA algorithm

L. Sreenivasulu Reddy

Summary: The strength of RSA public key cryptography depends on the complexity of factoring the largest integer into odd primes. Improving the efficiency of RSA in terms of operational time and data storage is challenging. This paper introduces a new public key cryptographic system, RM-RSA, which is four times more efficient than RSA while having lower security complexity.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2022)

Review Computer Science, Information Systems

Review of Algorithms for Artificial Intelligence on Low Memory Devices

Petar Radanliev et al.

Summary: The article aims to conceptualise a more compact and efficient version of artificial intelligence algorithms, integrating existing AI knowledge with novel concepts from neuromorphic engineering and deep learning algorithms for self-optimising and self-adapting autonomous AI design for edge analytics using real-time data.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm

Kaixin Jiao et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Information Systems

Asymmetric pixel confusion algorithm for images based on RSA and Arnold transform

Xiao-ling Huang et al.

FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2020)

Article Computer Science, Information Systems

A Lightweight Post-Quantum Lattice-Based RSA for Secure Communications

Iqra Mustafa et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data

Mohammad Ayoub Khan et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method

Wan Nur Aqlili Ruzai et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Implementation of RSA Signatures on GPU and CPU Architectures

Eduardo Ochoa-Jimenez et al.

IEEE ACCESS (2020)

Review Computer Science, Hardware & Architecture

Flexible Architectures for Cryptographic Algorithms - A Systematic Literature Review

Muhammad Rashid et al.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2019)

Article Mathematics, Applied

Forty years of attacks on the RSA cryptosystem : A brief survey

Majid Mumtaz et al.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2019)

Article Computer Science, Information Systems

A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature

Hongliang Zhu et al.

IEEE ACCESS (2019)

Article Mathematics, Applied

A novel accelerated implementation of RSA using parallel processing

Abhishek Rawat et al.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2019)

Article Computer Science, Information Systems

Elliptic Curve Lightweight Cryptography: A Survey

Carlos Andres Lara-Nino et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud

D. I. George Amalarethinam et al.

2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT) (2017)

Proceedings Paper Computer Science, Information Systems

Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing

Khalid El Makkaoui et al.

8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS (2017)

Proceedings Paper Computer Science, Information Systems

A MODIFIED RSA APPROACHFOR ENCRYPTING AND DECRYPTING TEXT AND IMAGES USING MULTI-POWER, MULTI PUBLIC KEYS, MULTI PRIME NUMBERS AND K-NEAREST NEIGHBOR ALGORITHM

Shikha Mathur et al.

INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016 (2016)

Article Computer Science, Information Systems

An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)

M. Thangavel et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2015)

Article Engineering, Multidisciplinary

Parallel RSA encryption based on tree architecture

Masumeh Damrudi et al.

JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS (2013)

Proceedings Paper Computer Science, Theory & Methods

Enhanced Method for RSA Cryptosystem Algorithm

Alaa Hussein Al-Hamami et al.

2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT) (2012)

Article Computer Science, Information Systems

Systematic literature reviews in software engineering - A systematic literature review

Barbara Kitchenham et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2009)

Article Computer Science, Hardware & Architecture

A survey of lightweight-cryptography implementations

Thomas Eisenbarth et al.

IEEE DESIGN & TEST OF COMPUTERS (2007)

Article Computer Science, Information Systems

Dual RSA and its security analysis

Hung-Min Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2007)