To see the other types of publications on this topic, follow the link: Multi-Prime RSA.

Journal articles on the topic 'Multi-Prime RSA'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multi-Prime RSA.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Baek, Yoo-Jin. "Key Recovery Algorithm from Randomly-Given Bits of Multi-Prime RSA and Prime Power RSA." Journal of the Korea Institute of Information Security and Cryptology 26, no. 6 (2016): 1401–11. http://dx.doi.org/10.13089/jkiisc.2016.26.6.1401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Talunohi, Iwada Grawilser, Ibnu Jaki Lubis, Sutarman Sutarman, and Ade Candra. "Performance Comparison Analysis of Multi Prime RSA and Multi Power RSA." CESS (Journal of Computer Engineering, System and Science) 8, no. 2 (2023): 576. http://dx.doi.org/10.24114/cess.v8i2.47350.

Full text
Abstract:
Saat ini cukup banyak algoritma yang digunakan untuk pengamanan informasi dalam sistem atau perangkat lunak. Masing-masing algoritma tersebut memiliki tingkat waktu dalam key generate, enrkripsi dan dekripsi yang berbeda-beda. Dalam menggunakan algoritma tersebut harus mempertimbangkan waktu jika ingin menerapkan dalam suatu sistem atau perangkat lunak. Dalam penelitian ini, akan melakukan perbandingan kinerja dari dua algoritma asimetris yaitu Multi Power RSA dan Multi Prime RSA yang masing-masing merupakan varian dari RSA. Algoritma ini terdiri dari 2 kunci yaitu kunci publik dan kunci priva
APA, Harvard, Vancouver, ISO, and other styles
3

Kamardan, M. Ghazali, N. Aminudin, Norziha Che-Him, Suliadi Sufahani, Kamil Khalid, and Rozaini Roslan. "Modified Multi Prime RSA Cryptosystem." Journal of Physics: Conference Series 995 (April 2018): 012030. http://dx.doi.org/10.1088/1742-6596/995/1/012030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Surinder, Kaur 1. Pooja Bhardwaj 2. and Shivani Mankotia 3. *. "Study of Multi-Prime RSA." Fusion: Practice and Applications (FPA) 1, no. 1 (2020): 40–48. https://doi.org/10.5281/zenodo.3825935.

Full text
Abstract:
<em>Fusion: Practice and Applications (FPA)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Vol. 1, No. 1, PP. 40-48, 2020</em>
APA, Harvard, Vancouver, ISO, and other styles
5

Pradhan, Sushma, and Birendra Kumar Sharma. "Improved Semantically Secured Variant of RSA Public Key Cryptosystem." International Journal of Informatics and Communication Technology (IJ-ICT) 4, no. 3 (2015): 91. http://dx.doi.org/10.11591/ijict.v4i3.pp91-97.

Full text
Abstract:
&lt;p&gt;Boneh and Shacham gave a nice survey on four variants (Batch RSA, Multi-Prime RSA, Multi-Power RSA, and Rebalanced RSA). Batch RSA and Multi-Prime RSA were then combined to increase the decryption/signature generation performance. Here in this paper we further tried to increase the encryption/ signature verification performance. The proposed scheme is semantically secure also.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
6

Mehta, Jay, and Hitarth Rana. "Safest-Value of the Number of Primes in RSA Modulus and an Improvised Generalized Multi-Moduli RSA." Mathematics 13, no. 10 (2025): 1690. https://doi.org/10.3390/math13101690.

Full text
Abstract:
Several attacks on the well-known RSA cryptosystem that can be extended to a multi-prime version of RSA reveal that it is preferable to use the modulus having more prime factors. On the contrary, the larger the number of prime factors of the modulus, the greater the risk of its factorization, due to the reduced size of its prime factors. In this paper, we derive an optimal value of the number of prime factors in a multi-prime RSA modulus and introduce the notion of the “safest-value” and determine such safest-values for moduli of different sizes. By utilizing this concept, we propose an enhanc
APA, Harvard, Vancouver, ISO, and other styles
7

Dogondaji, A., B. Sani, A. Ibrahim, and S. Abubakar. "Cryptanalysis Attacks on Multi Prime Power Modulus Through Analyzing Prime Difference." International Journal of Science for Global Sustainability 9, no. 1 (2023): 9. http://dx.doi.org/10.57233/ijsgs.v9i1.405.

Full text
Abstract:
The Security of Rivest, Shamir and Adleman Cryptosystem known as RSA and its variants rely on the difficulty of integer factorization problem. This paper presents a short decryption exponent attack on RSA variant based on the key equation where prime difference was carefully analyzed and came up with an approximation of as which enabled us to obtain an improved bound that led to the polynomial time factorization of the variant .
APA, Harvard, Vancouver, ISO, and other styles
8

ZHANG, Hui, and Tsuyoshi TAKAGI. "Improved Attacks on Multi-Prime RSA with Small Prime Difference." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A, no. 7 (2014): 1533–41. http://dx.doi.org/10.1587/transfun.e97.a.1533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

R., SaiGanesh*1 Dr. K. Venkataramana2. "Optimized Digital Signature Algorithm with Multi-Prime RSA." International Journal of Scientific Research and Technology 2, no. 3 (2025): 434–39. https://doi.org/10.5281/zenodo.15078329.

Full text
Abstract:
Digital signatures are an essential cryptographic technique used to ensure the authenticity, integrity, and non-repudiation of digital messages. This paper presents on optimizing RSA-based digital signatures by integrating Multi-Prime RSA, Chinese Remainder Theorem (CRT)-based signing, Sliding Window Exponentiation, and SHA-3 hashing to enhance performance and security. Multi-Prime RSA improves efficiency by using multiple primes, reducing computational complexity while maintaining strong encryption. The CRT-based optimization accelerates signing by breaking computations into smaller modular e
APA, Harvard, Vancouver, ISO, and other styles
10

Kaur, Surinder, Pooja Bharadwaj, and Shivani Mankotia. "Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES." International Journal of Computer Network and Information Security 9, no. 9 (2017): 22–29. http://dx.doi.org/10.5815/ijcnis.2017.09.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hasan, Md Mohibul, and Sohana Jahan. "Variants of RSA and Rabin Cryptosystems modulo p^rq^s." GANIT: Journal of Bangladesh Mathematical Society 44, no. 2 (2024): 1–16. https://doi.org/10.3329/ganit.v44i2.78527.

Full text
Abstract:
Cryptography is the technique to protect sensitive information from unauthorized persons by encryption. Cryptographers have invented various systems of cryptography to make it befitting. In the age of modern science, the use of mathematical theories has added a new dimension to cryptography. Prime factorization-based cryptography is widely used and effective. In 1977, Rivest, Shamir, and Adlerman proposed the first practical public key cryptosystem based on the prime factorization of large numbers known as the RSA cryptosystem. Later in 1979, Michael Oser Rabin developed a technique based on p
APA, Harvard, Vancouver, ISO, and other styles
12

Zega, Imanuel, Mohammad Andri Budiman, and Syahril Efendi. "Comparative Analysis of Ciphertext Enlargement on Generalization of the ElGamal and Multi-factor RSA." Data Science: Journal of Computing and Applied Informatics 7, no. 1 (2023): 44–50. http://dx.doi.org/10.32734/jocai.v7.i1-10360.

Full text
Abstract:
Information and communication security has become more crucial and has become a new problem in relation to security, accessibility, data management, and other information policy challenges as a result of how easy it is for all users to use communication media. One of the fields of science that has a technique or art for disguising the data sent by the sender to the recipient with the aim of maintaining the confidentiality of the data is called cryptography. In determining better cryptographic algorithms for data security systems, in addition to considering strength, key length and ciphertext e
APA, Harvard, Vancouver, ISO, and other styles
13

TAKAYASU, Atsushi, and Noboru KUNIHIRO. "General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A, no. 1 (2017): 50–61. http://dx.doi.org/10.1587/transfun.e100.a.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ibrahim, Zaid, Sadiq Shehu, and Saidu I. Abubakar. "Public key exponent attacks on multi-prime power modulus using continued fraction expansion method." Caliphate Journal of Science and Technology 5, no. 1 (2023): 1–9. http://dx.doi.org/10.4314/cajost.v5i1.1.

Full text
Abstract:
This paper proposes three public key exponent attacks of breaking the security of the prime power modulus 𝑁=𝑝2𝑞2 where 𝑝 and 𝑞 are distinct prime numbers of the same bit size. The first approach shows that the RSA prime power modulus 𝑁=𝑝2𝑞2 for q&lt;𝑝&lt;2q using key equation 𝑒𝑑−𝑘𝜙(𝑁)=1 where 𝜙(𝑁)= 𝑝2𝑞2(𝑝−1)(𝑞−1) can be broken by recovering the secret keys 𝑘 /𝑑 from the convergents of the continued fraction expansion of e/𝑁−2𝑁3/4 +𝑁1/2 . The paper also reports the second and third approaches of factoring 𝑛 multi-prime power moduli 𝑁𝑖=𝑝𝑖2 𝑞𝑖2 simultaneously through exploiting generalized system
APA, Harvard, Vancouver, ISO, and other styles
15

Bahig, Hatem M., Dieaa I. Nassr, Ashraf Bhery, and Abderrahmane Nitaj. "A Unified Method for Private Exponent Attacks on RSA Using Lattices." International Journal of Foundations of Computer Science 31, no. 02 (2020): 207–31. http://dx.doi.org/10.1142/s0129054120500045.

Full text
Abstract:
Let [Formula: see text] be an RSA public key with private exponent [Formula: see text] where [Formula: see text] and [Formula: see text] are large primes of the same bit size. At Eurocrypt 96, Coppersmith presented a polynomial-time algorithm for finding small roots of univariate modular equations based on lattice reduction and then succussed to factorize the RSA modulus. Since then, a series of attacks on the key equation [Formula: see text] of RSA have been presented. In this paper, we show that many of such attacks can be unified in a single attack using a new notion called Coppersmith’s in
APA, Harvard, Vancouver, ISO, and other styles
16

Michalkovič, Aleksėjus, and Jokūbas Žitkevičius. "Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations." Lietuvos matematikos rinkinys 64 (November 20, 2023): 25–35. http://dx.doi.org/10.15388/lmr.2023.33590.

Full text
Abstract:
In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. To improve the performance of the modified attack we introduce additional parameters. We present the theoretical upper bound on the search range parameter and define a shifting parameter based on the empirical results. Since these changes make our attack probabilistic, we investigate the dependence of the success on the values of the newly defined parameters.
APA, Harvard, Vancouver, ISO, and other styles
17

Lyu, Shuhan. "Advances in Digital Signature Algorithms: Performance, Security and Future Prospects." ITM Web of Conferences 73 (2025): 03010. https://doi.org/10.1051/itmconf/20257303010.

Full text
Abstract:
With the rise of online transactions and digital communications, digital signatures have become essential for verifying document integrity and authenticity across fields like finance, government, and healthcare. This article examines several important digital signature algorithms, analyzing their principles and performance. Each algorithm offers unique advantages: the Rivest – Shamir – Adleman (RSA) provides security through integer factorization, the Digital Signature Algorithm (DSA) through discrete logarithms, and the Elliptic Curve Digital Signature Algorithm (ECDSA) with the efficient ell
APA, Harvard, Vancouver, ISO, and other styles
18

Su, Qianqian, Rui Zhang, and Rui Xue. "Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud." Computer Journal 63, no. 8 (2020): 1271. http://dx.doi.org/10.1093/comjnl/bxz165.

Full text
Abstract:
Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficie
APA, Harvard, Vancouver, ISO, and other styles
19

Akchiche, Omar, and Omar Khadir. "Factoring multi power RSA moduli with a class of secret exponents." Acta Universitatis Sapientiae, Informatica 7, no. 2 (2015): 143–50. http://dx.doi.org/10.1515/ausi-2015-0016.

Full text
Abstract:
Abstract In this paper, we consider the RSA variant based on the key equation ed ≡ 1 (mod φ(N)) where N = prq, r ≥ 2. We show that if the secret exponent d is close to any multiple of the prime factor p or its powers, then it is possible to factor N in polynomial time in log N.
APA, Harvard, Vancouver, ISO, and other styles
20

Saladi, Sarojini Devi, and Radhika Yarlagadda. "An Enhanced Bankruptcy Prediction Model Using Fuzzy Clustering Model and Random Forest Algorithm." Revue d'Intelligence Artificielle 35, no. 1 (2021): 77–83. http://dx.doi.org/10.18280/ria.350109.

Full text
Abstract:
The rapid advancements made in Information Technologies (IT) have evolved in the prediction model for financial data. Research in the prediction of bankruptcy is inclining to owe to the growth of related associations with economic and social phenomena. Financial crises in recent scenarios have influenced the growth of financial institutions. Hence, the need for bankruptcy risk prediction at an earlier stage is of prime importance. Though several prediction algorithms were suggested, the predictive models' accuracy is still a challenging task. In this paper, a bankruptcy prediction model is dev
APA, Harvard, Vancouver, ISO, and other styles
21

Lenz, Heinz-Josef, Thibaud Koessler, Paul Oberstein, et al. "Abstract CT570: KISIMA-01: A first-in-human trial of the heterologous prime-boost vaccine ATP128/VSV-GP128 with ezabenlimab (BI 754091) in patients with stage IV colorectal cancer." Cancer Research 82, no. 12_Supplement (2022): CT570. http://dx.doi.org/10.1158/1538-7445.am2022-ct570.

Full text
Abstract:
Abstract Background: Most microsatellite stable/mismatch repair proficient (MSS/MMRp) stage IV colorectal cancers (CRC) do not respond to PD-1 inhibition. ATP128, based on the KISIMA platform, is a single chimeric fusion protein, composed of 3 elements essential to generate potent antitumoral cellular immunity: a proprietary cell-penetrating peptide (CPP) for antigen delivery, a proprietary Toll-like receptor (TLR)-peptide agonist with self-adjuvant properties and a modulable multi-antigenic domain (Mad), where the Mad for CRC includes 3 antigens: carcinoembryonic antigen (CEA), Survivin, Acha
APA, Harvard, Vancouver, ISO, and other styles
22

Andor, Noemi, Erin Simonds, Jiamin Chen, et al. "Massively Parallel Single Cell RNA-Seq of Primary Lymphomas Reveals Distinct Cellular Lineages and Diverse, Intratumoral Transcriptional States." Blood 128, no. 22 (2016): 1090. http://dx.doi.org/10.1182/blood.v128.22.1090.1090.

Full text
Abstract:
Abstract Follicular lymphoma (FL) is a generally incurable B-cell malignancy which has the potential to transform into highly aggressive lymphomas. Genomic studies indicate it is often a small subpopulation rather than the dominant population in the FL that gives rise to the more aggressive subtype.To resolve the underlying transcriptional networks of follicular B-cell lymphomas at single molecule and cell resolution, we leveraged droplet-based barcoding technology for highly parallel single cell RNA-Seq. We analyzed the transcriptomes from tens of thousands of cells derived from five primary
APA, Harvard, Vancouver, ISO, and other styles
23

Seligmann, Jenny F., Thibaud Kossler, Murielle Mauer, et al. "Durvalumab and tremelimumab plus local tumor ablation (RFA or stereotactic radiotherapy) in patients with metastatic colorectal cancer with unresectable liver metastases: Results of the EORTC-1560-GITCG (ILOC) phase II study." Journal of Clinical Oncology 41, no. 4_suppl (2023): 141. http://dx.doi.org/10.1200/jco.2023.41.4_suppl.141.

Full text
Abstract:
141 Background: Treatment for patients (pts) with metastatic colorectal cancer (mCRC) with unresectable liver metastases (mets) is usually chemotherapy (CT) +/- local ablative treatments. Immunotherapy (IO) effect is disappointing in mCRC with pMMR status so testing strategies to promote immune activation is key. Previous studies show that local ablative treatments may induce local immune activation and prime for IO response. Methods: This multi-center non-randomised early phase II study aims to test whether local liver therapy in combination with durvalumab and tremelimumab (durv/trem) will l
APA, Harvard, Vancouver, ISO, and other styles
24

Shahjehan, Faisal, Saivaishnavi Kamatham, and Pashtoon Murtaza Kasi. "Circulating tumor DNA testing and research in patients with gastrointestinal malignancies." Journal of Clinical Oncology 37, no. 4_suppl (2019): 525. http://dx.doi.org/10.1200/jco.2019.37.4_suppl.525.

Full text
Abstract:
525 Background: The hallmark of circulating tumor DNA (ctDNA) is its rapid turnaround and non-invasive nature. According to American Society of Clinical Oncology (ASCO) and College of American Pathologists joint ctDNA review published in March 2018, there is no sufficient evidence to support the use of ctDNA in practice for GI cancers. However, there were numerous studies presented at ASCO Annual Meeting supporting its value. We aimed to summarizing on its role in the management of gastrointestinal cancers based on the studies presented recently. Methods: We limited our search to keywords ‘ctD
APA, Harvard, Vancouver, ISO, and other styles
25

Hoppe, Michał Marek, Qing Hao Miow, Nimmi Baby, et al. "Abstract P27: STCC Unified PD1/PD-L1 Evaluation of Response (SUPER) – a Use-Case Study of the Translational Research Integration and Support Platform." Cancer Research 85, no. 15_Supplement (2025): P27. https://doi.org/10.1158/1538-7445.fcs2024-p27.

Full text
Abstract:
Abstract Background &amp; Objectives: Immune Checkpoint Inhibitors hold a significant proportion of the cancer drug market, yet varied responses they elicit present challenges in the clinical setting. Patients who show exceptional and poor responses to this cancer treatment, provide invaluable insights into the factors determining survival outcomes. The SUPER study, a collaboration among multiple institutions, aims to develop and validate a combined assay of predictive biomarkers for PD-1/PD-L1 inhibition leveraging on Singapore Translational Cancer Consortium (STCC)’s Translational and Pre-cl
APA, Harvard, Vancouver, ISO, and other styles
26

Olesinski, Elyse, Karanpreet Bhatia, Chuqi Wang, et al. "Targeting Mitochondrial Apoptotic Priming State to Personalize Therapy for Relapsed Acute Myeloid Leukemia." Blood 142, Supplement 1 (2023): 48. http://dx.doi.org/10.1182/blood-2023-189156.

Full text
Abstract:
Despite of remarkable changes in therapeutic landscape of AML in past 5 years, relapsed AML patients still succumb to disease. In majority of patients, the common cause of death ultimately is the emergence multi-drug resistance at relapse. Using patient-derived xenograft (PDX) as our models, we investigated the basis of multi-drug resistance and methods for identifying drug sensitivity in relapsed AML. We hypothesized that there is differential activation of drug-induced mitochondrial apoptotic signaling between treatment-naïve and relapsed myeloblasts. To study mechanisms of drug resistance i
APA, Harvard, Vancouver, ISO, and other styles
27

Chandhok, Namrata S., Wei Wei, Ranjit Bindra, et al. "The PRIME Trial: PARP Inhibition in IDH Mutant Effectiveness Trial. a Phase II Study of Olaparib in Isocitrate Dehydrogenase (IDH) Mutant Relapsed/Refractory Acute Myeloid Leukemia and Myelodysplastic Syndrome." Blood 134, Supplement_1 (2019): 3909. http://dx.doi.org/10.1182/blood-2019-129168.

Full text
Abstract:
Background: Recurring mutations have been identified in acute myeloid leukemia (AML) and myelodysplastic syndrome (MDS) which translate to therapeutic targets. Isocitrate dehydrogenase-1 and -2 (IDH1/2) mutations occur in ~20% of AML, and up to 12% of patients with MDS. Three conserved mutational hotspots in the IDH enzymes alter their function and lead to the production of (R)-2-hydroxyglutarate (2HG), an oncometabolite with numerous downstream effects, including impaired DNA damage repair. Specifically, homologous recombination (HR) is impaired by inhibiting the function of histone demethyla
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Hongwei, Fengdong Cheng, P. Horna, et al. "Treatment of Antigen-Presenting Cells with Histone Deacetylase Inhibitors Represents a Novel Strategy To Overcome CD4+ T-Cell Tolerance: Divergent Effects on the IL10 and IL-12 Promoter." Blood 106, no. 11 (2005): 2392. http://dx.doi.org/10.1182/blood.v106.11.2392.2392.

Full text
Abstract:
Abstract Tumor-antigen-specific T-cell tolerance imposes a significant barrier to the development of effective therapeutic cancer vaccines. Bone marrow-derived antigen presenting cells (APCs) are critical in the induction of this unresponsive state. The requirement for APCs in tolerance induction, together with their well-known role in priming T-cell antitumor responses place APCs at the crossroads of immune activation versus immune tolerance and points to manipulation of these cells as an enticing strategy to modulate T-cell responses against tumors. Identification of the intracellular mechan
APA, Harvard, Vancouver, ISO, and other styles
29

Barta, Stefan K., Nathan H. Fowler, Jasmine Zain, et al. "Pembrolizumab and Copanlisib for the Treatment of Relapsed or Refractory Mature T-Cell Lymphomas." Blood 134, Supplement_1 (2019): 4031. http://dx.doi.org/10.1182/blood-2019-125385.

Full text
Abstract:
Background: Outcomes for relapsed or refractory mature T-cell lymphomas (RR TCL) are poor and have remained largely stagnant despite approval of several novel single agents in this setting over the last decade (Chihara D, et al. Br J Haematol. 2017). The observed chemoresistance of many aggressive T-cell lymphomas may be overcome by non-cytotoxic treatment strategies. Rationale for exploring checkpoint blockade in RR TCL is provided by genetic and immunological features of malignant T-cells and their microenvironment (Phillips T, et al. J Immunother Cancer. 2016). The PD-1 inhibitor pembrolizu
APA, Harvard, Vancouver, ISO, and other styles
30

Kataria, Bhavesh. "Variant of RSA-Multi prime RSA." International Journal of Scientific Research in Science, Engineering and Technology, September 10, 2014, 09–11. http://dx.doi.org/10.32628/ijsrset14113.

Full text
Abstract:
Variant of RSA - Multi prime RSA that is backwards compatible that is a system using multi prime RSA can interoperate with systems using standard RSA and this variant is used to speed up RSA decryption.
APA, Harvard, Vancouver, ISO, and other styles
31

.., Surinder, Shivani Mankotia, and Pooja Bharadwaj. "Study of Multi-Prime RSA." Fusion: Practice and Applications, 2020, 40–48. http://dx.doi.org/10.54216/fpa.010105.

Full text
Abstract:
This paper studies and analyses the encryption and decryption times of a popular variant of the RSA algorithm, the multi-prime RSA. This algorithm uses more than two prime numbers for the encryption process. In this paper, 3, 4, and 5 prime RSA algorithms have been implemented and studied. The rate of increase of encryption and decryption times with respect to the number of primes used is also illustrated and compared graphically.
APA, Harvard, Vancouver, ISO, and other styles
32

Hinek, M. Jason. "On the security of multi-prime RSA." Journal of Mathematical Cryptology 2, no. 2 (2008). http://dx.doi.org/10.1515/jmc.2008.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zhao, Chunzhi, Jinzheng Cao, Junqi Zhang, and Qingfeng Cheng. "Fault attacks on multi-prime RSA signatures." Designs, Codes and Cryptography, December 27, 2024. https://doi.org/10.1007/s10623-024-01554-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ramamoorthy, A., Anurag Dutta, and M. Gayathri Lakshmi. "Enhanced Encryption of Lunar Hyperspectral Data using Blinded Multi Prime RSA Cryptosystem." Journal of the Indian Society of Remote Sensing, April 26, 2025. https://doi.org/10.1007/s12524-025-02188-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

R, Santosh Kumar, Prakash Klnc, and Krishna Srm. "An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent." Cryptologia, January 5, 2024, 1–14. http://dx.doi.org/10.1080/01611194.2023.2271463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zhao, Dan, and Yan Gao. "Archive information and privacy protection based on IPFS and multi-prime RSA encryption algorithms." Journal of Computational Methods in Sciences and Engineering, July 30, 2025. https://doi.org/10.1177/14727978251364446.

Full text
Abstract:
Focusing on the security issues of medical archive information, a privacy protection technology for archive information that integrates blockchain, interstellar file system, and encryption algorithms is proposed. Among them, the research focuses on building an archive information sharing platform based on sharded blockchain, introducing reputation consensus algorithm to adjust computational pressure, and strengthening storage security and sharing stability. At the same time, research has proposed an encryption technique that integrates multiple prime asymmetric encryption algorithms to enhance
APA, Harvard, Vancouver, ISO, and other styles
37

Gan, Rui. "Time-Based Cryptosystem." Science and Technology of Engineering, Chemistry and Environmental Protection 1, no. 9 (2024). http://dx.doi.org/10.61173/5c6ywp91.

Full text
Abstract:
In this paper we introduce a Time-Based Cryptosystem (TBC) scheme. This scheme requires a Time-Based Key Generation Center (TBKGC) to broadcast a set of public keys based on the Multi-prime RSA (MPRSA) at every new interval. The sender encrypts the plaintext with a specified period of time and the corresponding public key broadcast by the TBKGC. And the receiver acquires the corresponding key from the TBKGC to decrypt the ciphertext. We discuss the difference between TBC and Time-Specific Encryption (TSE). Finally we suggest extension and directions of improvement of TBC.
APA, Harvard, Vancouver, ISO, and other styles
38

Somsuk, Kritsanapong. "The improved algorithm to limit scope for recovering private key in Multi-Prime RSA by utilizing Quantum Fourier Transform." Cogent Engineering 11, no. 1 (2024). http://dx.doi.org/10.1080/23311916.2023.2301149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Haldar, Bilas, Rohit Sinha, and Pranam Paul. "Enhancing the Security in Group Message Communication Using Multi-Party Key Distribution Technique." Journal of Mobile Multimedia, December 20, 2024, 961–96. https://doi.org/10.13052/jmm1550-4646.2051.

Full text
Abstract:
Authentication and authorization techniques are essential for any kind of secure transaction over the Internet. It enables and empowers mechanisms to implement highly secure systems such as digital financial transition systems, hospitality management systems, and defence organizations. Most of the work on these techniques has been done based on single-user authorization. It is less secure than the multi-user authorization technique. Multi-party settings require the authorization of the majority user pool, the work is still in its nascent stage. Hence the presented work includes a multi-user au
APA, Harvard, Vancouver, ISO, and other styles
40

Nikolaus, Castell-Castell. "RSA, PGP, Bitcoin & Co. 25 partial considerations, using only multiplication and division to break down a composite product into its prime factors. Consideration 1." July 26, 2021. https://doi.org/10.5281/zenodo.5138037.

Full text
Abstract:
The main innovation in this first essay is to reflect on the method of manual calculation and not a) rely on formulas that others have thought in advance and which demonstrably have not worked for over 40 years despite great effort and b) not Wanting to let calculators do the work, but to think for yourself. According to the logic that is accessible to every verbally thinking person (called &ldquo;language logic&rdquo; here), numbers (here multi-digit prime factors that could previously be multiplied manually) must also be &ldquo;de-multiplied manually.&rdquo; The myth that the product of mult
APA, Harvard, Vancouver, ISO, and other styles
41

Yamada, Keisuke, Kanta Suga, Naoko Abe, et al. "Multi-objective computational optimization of human 5′ UTR sequences." Briefings in Bioinformatics 26, no. 3 (2025). https://doi.org/10.1093/bib/bbaf225.

Full text
Abstract:
Abstract The computational design of messenger RNA (mRNA) sequences is a critical technology for both scientific research and industrial applications. Recent advances in prediction and optimization models have enabled the automatic scoring and optimization of $5^\prime $ UTR sequences, key upstream elements of mRNA. However, fully automated design of $5^\prime $ UTR sequences with more than two objective scores has not yet been explored. In this study, we present a computational pipeline that optimizes human $5^\prime $ UTR sequences in a multi-objective framework, addressing up to four distin
APA, Harvard, Vancouver, ISO, and other styles
42

Rengifo-Gonzalez, Monica, Maria-Vittoria Mazzuoli, Axel B. Janssen, et al. "Make-or-break prime editing for genome engineering in Streptococcus pneumoniae." Nature Communications 16, no. 1 (2025). https://doi.org/10.1038/s41467-025-59068-8.

Full text
Abstract:
Abstract CRISPR-Cas9 has revolutionized genome engineering by allowing precise introductions of DNA double-strand breaks (DSBs). However, genome engineering in bacteria is still a complex, multi-step process requiring a donor DNA template for repair of DSBs. Prime editing circumvents this need as the repair template is indirectly provided within the prime editing guide RNA (pegRNA). Here, we developed make-or-break Prime Editing (mbPE) that allows for precise and effective genetic engineering in the opportunistic human pathogen Streptococcus pneumoniae. In contrast to traditional prime editing
APA, Harvard, Vancouver, ISO, and other styles
43

Durieux Trouilleton, Quentin, Sergio Barata-García, Benoît Arragain, Juan Reguera, and Hélène Malet. "Structures of active Hantaan virus polymerase uncover the mechanisms of Hantaviridae genome replication." Nature Communications 14, no. 1 (2023). http://dx.doi.org/10.1038/s41467-023-38555-w.

Full text
Abstract:
AbstractHantaviruses are causing life-threatening zoonotic infections in humans. Their tripartite negative-stranded RNA genome is replicated by the multi-functional viral RNA-dependent RNA-polymerase. Here we describe the structure of the Hantaan virus polymerase core and establish conditions for in vitro replication activity. The apo structure adopts an inactive conformation that involves substantial folding rearrangement of polymerase motifs. Binding of the 5′ viral RNA promoter triggers Hantaan virus polymerase reorganization and activation. It induces the recruitment of the 3′ viral RNA to
APA, Harvard, Vancouver, ISO, and other styles
44

Arragain, Benoît, Quentin Durieux Trouilleton, Florence Baudin, et al. "Structural snapshots of La Crosse virus polymerase reveal the mechanisms underlying Peribunyaviridae replication and transcription." Nature Communications 13, no. 1 (2022). http://dx.doi.org/10.1038/s41467-022-28428-z.

Full text
Abstract:
AbstractSegmented negative-strand RNA bunyaviruses encode a multi-functional polymerase that performs genome replication and transcription. Here, we establish conditions for in vitro activity of La Crosse virus polymerase and visualize its conformational dynamics by cryo-electron microscopy, unveiling the precise molecular mechanics underlying its essential activities. We find that replication initiation is coupled to distal duplex promoter formation, endonuclease movement, prime-and-realign loop extension and closure of the polymerase core that direct the template towards the active site. Tra
APA, Harvard, Vancouver, ISO, and other styles
45

Smirnov, Artem, Anna Maria Lena, Giulia Tosetti, et al. "Epigenetic priming of an epithelial enhancer by p63 and CTCF controls expression of a skin-restricted gene XP33." Cell Death Discovery 9, no. 1 (2023). http://dx.doi.org/10.1038/s41420-023-01716-3.

Full text
Abstract:
AbstractThe transcription factor p63 is a renowned master regulator of gene expression of stratified epithelia. While multiple proteins have been identified as p63 bona fide targets, little is known about non-coding RNAs (ncRNAs) whose transcription is controlled by p63. Here, we describe a skin-specific non-coding RNA XP33 as a novel target of p63. XP33 levels are increased during keratinocyte differentiation in vitro, while its depletion results in decreased expression of late cornified gene LCE2D. By using publicly available multi-omics data, we show that CTCF and p63 establish an epithelia
APA, Harvard, Vancouver, ISO, and other styles
46

Natalini, Ambra, Sonia Simonetti, Gabriele Favaretto, et al. "Improved memory CD8 T cell response to delayed vaccine boost is associated with a distinct molecular signature." Frontiers in Immunology 14 (February 14, 2023). http://dx.doi.org/10.3389/fimmu.2023.1043631.

Full text
Abstract:
Effective secondary response to antigen is a hallmark of immunological memory. However, the extent of memory CD8 T cell response to secondary boost varies at different times after a primary response. Considering the central role of memory CD8 T cells in long-lived protection against viral infections and tumors, a better understanding of the molecular mechanisms underlying the changing responsiveness of these cells to antigenic challenge would be beneficial. We examined here primed CD8 T cell response to boost in a BALB/c mouse model of intramuscular vaccination by priming with HIV-1 gag-encodi
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Degao, Erik A. Myers, Shuya Xuan, et al. "Heritable, multinucleotide deletions in plants using viral delivery of a repair exonuclease and guide RNAs." Plant Physiology, January 18, 2024. http://dx.doi.org/10.1093/plphys/kiae015.

Full text
Abstract:
Abstract CRISPR/Cas9-mediated mutagenesis typically results in short insertion/deletion (indel) mutations, which are often too small to disrupt the function of cis-acting regulatory elements. Here, we describe a highly efficient in planta gene editing approach, called VirTREX2-HLDel, that achieves heritable multi-nucleotide deletions in both protein-coding genes and non-coding DNA regulatory elements. VirTREX2-HLDel uses RNA viruses to deliver both the three prime repair exonuclease 2 (TREX2) and single guide RNAs. Our method enables recovery of multiplexed heritable deletions and increases th
APA, Harvard, Vancouver, ISO, and other styles
48

Knoch, Dominic, Rhonda C. Meyer, Marc C. Heuermann, et al. "Integrated multi‐omics analyses and genome‐wide association studies reveal prime candidate genes of metabolic and vegetative growth variation in canola." Plant Journal, November 15, 2023. http://dx.doi.org/10.1111/tpj.16524.

Full text
Abstract:
SUMMARYGenome‐wide association studies (GWAS) identified thousands of genetic loci associated with complex plant traits, including many traits of agronomical importance. However, functional interpretation of GWAS results remains challenging because of large candidate regions due to linkage disequilibrium. High‐throughput omics technologies, such as genomics, transcriptomics, proteomics and metabolomics open new avenues for integrative systems biological analyses and help to nominate systems information supported (prime) candidate genes. In the present study, we capitalise on a diverse canola p
APA, Harvard, Vancouver, ISO, and other styles
49

Song, Qiao, Yuli Hou, Yiyin Zhang, et al. "Integrated multi-omics approach revealed cellular senescence landscape." Nucleic Acids Research, October 16, 2022. http://dx.doi.org/10.1093/nar/gkac885.

Full text
Abstract:
Abstract Cellular senescence is a complex multifactorial biological phenomenon that plays essential roles in aging, and aging-related diseases. During this process, the senescent cells undergo gene expression altering and chromatin structure remodeling. However, studies on the epigenetic landscape of senescence using integrated multi-omics approaches are limited. In this research, we performed ATAC-seq, RNA-seq and ChIP-seq on different senescent types to reveal the landscape of senescence and identify the prime regulatory elements. We also obtained 34 key genes and deduced that NAT1, PBX1 and
APA, Harvard, Vancouver, ISO, and other styles
50

He, Ying-Ming, and Liang Cheng. "More than just Alkene Construction – Re‐using Wittig Reactions/Reagents in Biomacromolecular Labeling, Imaging, Sequencing and Modification." Analysis & Sensing, March 12, 2024. http://dx.doi.org/10.1002/anse.202300098.

Full text
Abstract:
Classical organic chemical reactions are essential for modern synthetic chemistry and offer valuable insights for chemical biology research. The pioneering bioorthogonal chemistry, based on the Staudinger reaction, is a prime example. However, the biocompatibility of classic "name" reactions like the Wittig reaction is still not fully explored. This versatile reaction efficiently converts carbonyl groups into olefins using phosphorus ylides, making it valuable in synthetic chemistry. Despite being in the early stages of development, the Wittig reaction and its reagents have various application
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!