An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)
暂无分享,去创建一个
P. Varalakshmi | M. Thangavel | Mukund Murrali | K. Nithya | M. Thangavel | P. Varalakshmi | K. Nithya | Mukund Murrali
[1] Neal R. Wagner,et al. The Laws of Cryptography with Java Code , 2003 .
[2] Rajan. S. Jamgekar,et al. File Encryption and Decryption Using Secure RSA , 2013 .
[3] Sachin Mahajan,et al. Performance Evolution of RSA and New Cryptosystem , 2012 .
[4] Chung-Hsien Wu,et al. RSA cryptosystem design based on the Chinese remainder theorem , 2001, Proceedings of the ASP-DAC 2001. Asia and South Pacific Design Automation Conference 2001 (Cat. No.01EX455).
[5] Carl Pomerance,et al. A Tale of Two Sieves , 1998 .
[6] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[7] Srushti Mathur,et al. Modified RSA Algorithm: A Secure Approach , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.
[8] Durai Raj Vincent,et al. An algorithm to enhance security in RSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[9] P. Ribenboim. The new book of prime number records , 1996 .
[10] Hamza Ali,et al. Timing Attack Prospect for RSA Cryptanalysts Using Genetic Algorithm Technique , 2004, Int. Arab J. Inf. Technol..
[11] R. Vijayaragavan,et al. Pell's RSA key generation and its security analysis , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[12] H. W. Lenstra,et al. Factoring integers with elliptic curves , 1987 .
[13] Tong Li,et al. The Research of the Batch RSA Decryption Performance , 2011 .
[14] N. Ravi Shankar,et al. A Novel Modular Multiplication Algorithm and its Application to RSA Decryption , 2012 .
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Behrouz A. Forouzan. Cryptography & Network Security , 2007 .
[17] Alaa Hussein Al-Hamami,et al. Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[18] Prashant Sharma,et al. RSA algorithm using modified subset sum cryptosystem , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[19] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .