Academic literature on the topic 'Asymmetric Key Cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Asymmetric Key Cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Asymmetric Key Cryptosystem"
Maxrizal, Maxrizal, and Baiq Desy Aniska Prayanti. "Public Key Cryptosystem Based on Polynomial Composition." Indonesian Journal of Mathematics Education 2, no. 2 (2019): 69. http://dx.doi.org/10.31002/ijome.v2i2.1813.
Full textKyaw, Myo Thu, Swar Hlaing Kyaw, and Aung Aung Nay. "Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 448–50. https://doi.org/10.5281/zenodo.3588011.
Full textZhou, Xuan Wu, and Yan Fu. "Blind Signature Based on Discrete Logarithm Type Cryptosystem." Advanced Materials Research 204-210 (February 2011): 1318–21. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1318.
Full textChen, Ling Jiao, and Ao Dong Shen. "A Novel Public Key Image Cryptosystem Based on Elliptic Curve and Arnold Cat Map." Advanced Materials Research 989-994 (July 2014): 4183–86. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4183.
Full textZhou, Xuan Wu. "Fast Public Key Cryptosystem Based Blind Signature Scheme." Applied Mechanics and Materials 20-23 (January 2010): 505–11. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.505.
Full textAgarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.
Full textIzzatul Nabila Sarbini, Tze Jin Wong, Lee Feng Koo, Ahmad Fadly Nurullah Rasedee, Fatin Hana Naning, and Mohammad Hasan Abdul Sathar. "Security Analysis on LUC-type Cryptosystems Using Common Modulus Attack." Journal of Advanced Research in Applied Sciences and Engineering Technology 29, no. 3 (2023): 206–13. http://dx.doi.org/10.37934/araset.29.3.206213.
Full textOkyere-Gyamfi, Steve, J. B., and Vivian Akoto-Adjepong. "An Enhanced Asymmetric Cryptosystem using Multiple Key System." International Journal of Computer Applications 176, no. 15 (2020): 18–26. http://dx.doi.org/10.5120/ijca2020920017.
Full textKotukh, Y., T. Okhrimenko, O. Dyachenko, N. Rotaneva, L. Kozina, and D. Zelenskyi. "Cryptanalysis of the system based on word problems using logarithmic signatures." Radiotekhnika, no. 206 (September 24, 2021): 106–14. http://dx.doi.org/10.30837/rt.2021.3.206.09.
Full textLv, Xixiang, Hui Li, and Baocang Wang. "Authenticated asymmetric group key agreement based on certificateless cryptosystem." International Journal of Computer Mathematics 91, no. 3 (2013): 447–60. http://dx.doi.org/10.1080/00207160.2013.806653.
Full textDissertations / Theses on the topic "Asymmetric Key Cryptosystem"
Bansal, Tarun Kumar. "Designing generic asymmetric key cryptosystem with message paddings." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/117071/1/Tarun%20Kumar_Bansal_Thesis.pdf.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textBook chapters on the topic "Asymmetric Key Cryptosystem"
Desai, Amogh, Virang Parekh, Utsav Unadkat, and Narendra Shekokar. "Performance Analysis of Various Asymmetric Public-Key Cryptosystem." In Pervasive Computing and Social Networking. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2840-6_34.
Full textFatima, Areeba, and Naveen K. Nishchal. "Single Public Key Dependent Attack on Optical Asymmetric Cryptosystem." In Springer Proceedings in Physics. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3908-9_38.
Full textKumar, Ashish, Jagadeesh Kakarla, and Muzzammil Hussain. "Asymmetric Key Cryptosystem and Digital Signature Algorithm Built on Discrete Logarithm Problem (DLP)." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16657-1_37.
Full textMaganti, Madhava Rao, and Rajashekar Rao Kurra. "Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem." In Information Systems Engineering and Management. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-69201-7_16.
Full textJayasree, P., and V. Saravanan. "Non-deterministic Paillier Endorsement Asymmetric Key Cryptosystem-Based Whirlpool Hashing Quotient Filter for Secured Data Access on Cloud Storage." In Smart Intelligent Computing and Applications. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9282-5_13.
Full textStohrer, Christian, and Thomas Lugrin. "Asymmetric Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_3.
Full textHelal Ahmed, Md, Jagmohan Tanti, and Sumant Pushp. "A Public Key Cryptosystem Using Cyclotomic Matrices." In Coding Theory - Recent Advances, New Perspectives and Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.101105.
Full textMurphy, Sean, and Rachel Player. "Understanding cryptography." In Cryptography, 2nd ed. Oxford University PressOxford, 2025. https://doi.org/10.1093/actrade/9780192882233.003.0002.
Full textYang, Jie-feng, Li-shan Huang, and Cheng-lian Liu. "Review of Li-Li Mixture XOR Algorithm." In Modern Management based on Big Data III. IOS Press, 2022. http://dx.doi.org/10.3233/faia220107.
Full textGoh Alwyn. "Java-based Framework for the Secure Distribution of Electronic Medical Records." In Studies in Health Technology and Informatics. IOS Press, 1999. https://doi.org/10.3233/978-1-60750-912-7-582.
Full textConference papers on the topic "Asymmetric Key Cryptosystem"
Yuvarani, R., and R. Mahaveerakannan. "An Enhanced Multi-Key Asymmetric Cryptosystem for Strengthened Data Security." In 2024 International Conference on Sustainable Communication Networks and Application (ICSCNA). IEEE, 2024. https://doi.org/10.1109/icscna63714.2024.10863868.
Full textMaganti, Madhava Rao, Dharavatu Mangamma, Vineela Krishna Suri, Sureddy Venkat Swamy, Amanulla Mohammad, and Vahiduddin Shariff. "Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem." In 2024 IEEE 3rd World Conference on Applied Intelligence and Computing (AIC). IEEE, 2024. http://dx.doi.org/10.1109/aic61668.2024.10730910.
Full textGagneja, Kunal, and K. John Singh. "Spindle Torus Asymmetric Key Cryptosystem." In 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE). IEEE, 2020. http://dx.doi.org/10.1109/ic-etite47903.2020.22.
Full textGil, Sang-Keun, Seok-Hee Jeon, Jong-Rae Jung, and Nam Kim. "Asymmetric public key cryptosystem using digital holographic encryption method." In Practical Holography XXXIV: Displays, Materials, and Applications, edited by Hans I. Bjelkhagen. SPIE, 2020. http://dx.doi.org/10.1117/12.2548289.
Full text