High speed data encryption technique with optimized memory based RSA algorithm for communications
暂无分享,去创建一个
A. K. Budati | Anil Kumar Budati | Kumar Cherukupalli | Ganesh Snv | Anil Kumar P. | Venkata Krishna Moorthy T. | P. A. Kumar | Kumar Cherukupalli | Ganesh Snv | T. V. K. Moorthy
[1] Xiaofeng Liao,et al. A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem , 2016, Multimedia Tools and Applications.
[2] G. A. Vijayalakshmi Pai. Design of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation , 2009 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Stefano Cagnon,et al. Genetic and Evolutionary Computation for Image Processing and Analysis , 2008 .
[5] Komal Patel,et al. Image Encryption Using Different Techniques: A Review , 2011 .
[6] Feng Gang. Design of Modular Multiplier Based on Improved Montgomery Algorithm and Systolic Array , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Chao-Hung Lin,et al. A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Richard Apau. Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion , 2016 .