[1]
|
An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
Symmetry,
2024
DOI:10.3390/sym16030263
|
|
|
[2]
|
Some Properties of the Computation of the Modular Inverse with Applications in Cryptography
Computation,
2023
DOI:10.3390/computation11040070
|
|
|
[3]
|
A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
Computers, Materials & Continua,
2023
DOI:10.32604/cmc.2023.036093
|
|
|
[4]
|
Generalization of RSA cryptosystem based on 2n primes
AIMS Mathematics,
2023
DOI:10.3934/math.2023958
|
|
|
[5]
|
Modeling and Optimization of Optical Communication Networks
2023
DOI:10.1002/9781119839569.ch18
|
|
|
[6]
|
Cyber Security, Privacy and Networking
Lecture Notes in Networks and Systems,
2022
DOI:10.1007/978-981-16-8664-1_17
|
|
|
[7]
|
An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)
International Journal of Information Technology,
2022
DOI:10.1007/s41870-022-00993-y
|
|
|
[8]
|
Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology
International Journal of Information Security and Privacy,
2022
DOI:10.4018/IJISP.308306
|
|
|
[9]
|
A Pattern of Prime Numbers and its Application in Primality Testing
Journal of Physics: Conference Series,
2022
DOI:10.1088/1742-6596/2381/1/012033
|
|
|
[10]
|
A Pattern of Prime Numbers and its Application in Primality Testing
Journal of Physics: Conference Series,
2022
DOI:10.1088/1742-6596/2381/1/012033
|
|
|
[11]
|
Preserving Confidentiality against Factorization Attacks using Fake Modulus ($\zeta$) Approach in RSA and its Security Analysis
2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON),
2022
DOI:10.1109/UPCON56432.2022.9986419
|
|
|
[12]
|
Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology
International Journal of Information Security and Privacy,
2022
DOI:10.4018/IJISP.308306
|
|
|
[13]
|
A Note on the Computation of the Modular Inverse for Cryptography
Axioms,
2021
DOI:10.3390/axioms10020116
|
|
|
[14]
|
Multi-Prime RSA Verilog Implementation Using 4-Primes
2021 10th International Conference on Information and Automation for Sustainability (ICIAfS),
2021
DOI:10.1109/ICIAfS52090.2021.9605975
|
|
|
[15]
|
Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3129224
|
|
|
[16]
|
Enhancing the RSA algorithm using DH principles towards CIA compliance
2021 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC),
2021
DOI:10.1109/IMITEC52926.2021.9714654
|
|
|
[17]
|
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Symmetry,
2020
DOI:10.3390/sym13010045
|
|
|
[18]
|
RSA Cryptographic Algorithm using Cubic Congruential Generator
Journal of Physics: Conference Series,
2019
DOI:10.1088/1742-6596/1424/1/012010
|
|
|