Research trends review on RSA scheme of asymmetric cryptography techniques
暂无分享,去创建一个
[1] Gaurav Sharma,et al. An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks , 2016, Int. J. Netw. Secur..
[2] Iuon-Chang Lin,et al. An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[3] Nedal Tahat,et al. A new RSA public key encryption scheme with chaotic maps , 2020 .
[4] Shahnawaz Hussain,et al. Evaluation of DES, TDES, AES, Blowfish and Twofish Encryption Algorithm: Based on Space Complexity , 2014 .
[5] Willy Susilo,et al. A short identity-based proxy ring signature scheme from RSA , 2015, Comput. Stand. Interfaces.
[6] Long Wang,et al. A cost-Efficient Implementation of Public-key Cryptography on Embedded Systems , 2007, 2007 International Workshop on Electron Devices and Semiconductor Technology (EDST).
[7] Edwin R. Arboleda,et al. Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling , 2017 .
[8] V. Vaidehi,et al. Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks , 2010, CNSA.
[9] Lunzhi Deng,et al. Identity Based Proxy Signature from RSA without Pairings , 2017, Int. J. Netw. Secur..
[10] Abdulameer K. Hussain. A Modified RSA Algorithm for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Algorithm , 2015 .
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Lirong Qiu,et al. Implementing RSA for sensor nodes in smart cities , 2017, Personal and Ubiquitous Computing.
[13] Raman Kumar,et al. An advanced secure (t, n) threshold proxy signature scheme based on RSA cryptosystem for known signers , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).
[14] Wei Wei,et al. RSA-based digital image encryption algorithm in wireless sensor networks , 2010, 2010 2nd International Conference on Signal Processing Systems.
[15] P. Varalakshmi,et al. An Enhanced and Secured RSA Key Generation Scheme (ESRKGS) , 2015, J. Inf. Secur. Appl..
[16] Hayder Raheem Hashim. A New Modification of RSA Cryptosystem Based on The Number of The Private Keys , 2016 .
[17] Ali Saleh Al Najjar. Implementation Color-Images Cryptography Using RSA Algorithm , 2017 .
[18] H. Hashim,et al. A New Approach for Image Encryption in the Modified RSA Cryptosystem Using MATLAB , 2016 .
[19] Liang Wang,et al. A new personal information protection approach based on RSA cryptography , 2011, 2011 IEEE International Symposium on IT in Medicine and Education.
[20] Ueli Maurer,et al. Breaking RSA Generically Is Equivalent to Factoring , 2009, IEEE Transactions on Information Theory.
[21] Teddy Mantoro,et al. Comparison between RSA hardware and software implementation for WSNs security schemes , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.
[22] Alaa Hussein Al-Hamami,et al. Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[23] Sudipta Chattopadhyay,et al. A hybrid security algorithm for RSA cryptosystem , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).
[24] Justin Wyss-Gallifent. The ElGamal Cryptosystem , 2012 .
[25] Rakesh Kumar,et al. An RSA based certificateless signature scheme for wireless sensor networks , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[26] S. Anandakumar. Image Cryptography Using RSA Algorithm in Network Security , 2015 .
[27] Xin Zhou,et al. Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.
[28] D. Saraswady,et al. Estimation of Modified RSA Cryptosystem with Hyper Image Encryption Algorithm , 2017 .
[29] Sunil Kumar Khatri,et al. NFC Car Keys By Using RSA Cryptography In WSN Security , 2019, 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA).
[30] Chandrashekhar Meshram,et al. Discrete Logarithm and Integer Factorization using ID-based Encryption , 2015 .
[31] Huirong Fu,et al. Multi-asymmetric cryptographic RSA scheme , 2017, CISRC.
[32] Ahmed Eskander Mezher. Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys , 2018 .
[33] Durai Raj Vincent,et al. An algorithm to enhance security in RSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[34] Alaa Kadhim Farhan,et al. Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN , 2019, Engineering and Technology Journal.
[35] Selçuk Baktir,et al. Implementing RSA for Wireless Sensor Nodes , 2019, Sensors.
[36] Shihab A. Shawkat,et al. Modified RSA-based algorithm: a double secure approach , 2019 .