Academic literature on the topic 'RSA algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RSA algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "RSA algorithm"
Aminudin and Ilyas Nuryasin. "Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 4 (August 25, 2021): 768–73. http://dx.doi.org/10.29207/resti.v5i4.3297.
Full textKuljanski, Sonja. "RSA algorithm." Vojnotehnicki glasnik 58, no. 3 (2010): 65–77. http://dx.doi.org/10.5937/vojtehg1003065k.
Full textZajac, Bernard. "RSA algorithm factored." Computer Fraud & Security Bulletin 1994, no. 6 (June 1994): 2. http://dx.doi.org/10.1016/0142-0496(94)90109-0.
Full textBahjat Abdulrazzaq, Maiwan. "Selective Multi Keys to Modify RSA Algorithm." Journal of Zankoy Sulaimani - Part A 21, no. 1 (June 20, 2019): 99–106. http://dx.doi.org/10.17656/jzs.10748.
Full textAlguraby, Atyaf, and Mohammed Joudah Zaiter. "MULTI KEY ALGORITHM FOR SECURITY ENHANCEMENT OF RSA ALGORITHM USING MATLAB." Iraqi Journal of Information & Communications Technology 3, no. 1 (April 11, 2020): 1–10. http://dx.doi.org/10.31987/ijict.3.1.90.
Full textShin, Seung-Hyeok, Won-Sok Yoo, and Hojong Choi. "Development of Public Key Cryptographic Algorithm Using Matrix Pattern for Tele-Ultrasound Applications." Mathematics 7, no. 8 (August 17, 2019): 752. http://dx.doi.org/10.3390/math7080752.
Full textWibowo, Nur Cayo Hendro, Khotibul Umam, Albadru Muh Izul Khaq, and Favian Agung Rizki. "Komparasi Waktu Algoritma RSA dengan RSA-CRT Base On Computer." Walisongo Journal of Information Technology 2, no. 1 (June 17, 2020): 13. http://dx.doi.org/10.21580/wjit.2020.2.1.5402.
Full textSkobic, Velibor, Branko Dokic, and Zeljko Ivanovic. "Hardware modules of the RSA algorithm." Serbian Journal of Electrical Engineering 11, no. 1 (2014): 121–31. http://dx.doi.org/10.2298/sjee140114011s.
Full textRachmawati, Dian, Mohammad Andri Budiman, and William Andrei. "Comparison Of RSA Algorithm & Hybrid RSA-OTP Algorithm For Image Security." Journal of Physics: Conference Series 1235 (June 2019): 012076. http://dx.doi.org/10.1088/1742-6596/1235/1/012076.
Full textEt.al, R. Felista Sugirtha Lizy. "Image Encryption Using RK-RSA Algorithm in Aadhaar Card." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 4683–93. http://dx.doi.org/10.17762/turcomat.v12i3.1887.
Full textDissertations / Theses on the topic "RSA algorithm"
Таранова, Д. В. "Шифрування з відкритим кодом. Алгоритм RSA." Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43423.
Full textChatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.
Full textРоманюк, О. О., and М. П. Смаглюк. "Програмна реалізація алгоритму шифрування RSA." Thesis, Сумський державний університет, 2017. http://essuir.sumdu.edu.ua/handle/123456789/64443.
Full textДяченко, Є., М. Кір'ян, and С. Танський. "Реалізація алгоритму RSA з використанням новітніх WEB-технологій." Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43353.
Full textAl-Tuwaijry, Fahd A. A. "Fast algorithms for implementation of public-key cryptosystems : VLSI simulation of modified algorithm to increase the speed of public-key cryptosystem (RSA) implementation." Thesis, University of Bradford, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.282982.
Full textPrůcha, Jan. "Elektronický geocaching." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220208.
Full textNwaokocha, Martyns. "Shorův algoritmus v kvantové kryptografii." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-445457.
Full textPopovský, Michal. "Útoky postranními kanály." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218182.
Full textZeitoun, Rina. "Méthodes algébriques pour l'analyse de sécurité des implantations d'algorithmes cryptographiques." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066310/document.
Full textThe 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a crucial problem in cryptanalysis, which has been proven to be undecidable. However, Coppersmith published in 1996 a method based on lattice reduction, which allows to efficiently find all small solutions to some polynomial equations. Many applications of this method have risen in public key cryptanalysis, especially when the cryptosystem is executed on embedded systems and part of the secret key is revealed through physical attacks performed on the device. In this context, we propose in this thesis a physical attack on the RSA signature scheme when the CRT mode is used, where an application of Coppersmith's method allows to complete the information previously obtained by the physical attack. We also propose a new deterministic algorithm based on Coppersmith's method for factoring integers of the form $N=p^rq^s$ in polynomial time, under the condition that $r$ and/or $s$ are sufficiently large.Finally, if the applications of Coppersmith's method are numerous, in practice, since the lattices to be reduced are huge, the small solutions can only be recovered until a bound which is smaller than the enounced theoretical bound. Thus, another contribution of this thesis lies in the proposition of two methods which allow to speed up the execution time of Coppersmith's algorithm. When both speedups are combined, the new algorithm performs hundreds of times faster for typical parameters, which allows to reach the theoretical bound in many cases
Alzaabi, Mohamed Abdulla Hasan Saif. "New cryptanalysis and modelling for wireless networking." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/17115.
Full textBooks on the topic "RSA algorithm"
Schneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Paris: Vuibert, 2001.
Find full textEarnshaw, Rae A. Fundamental Algorithms for Computer Graphics: NATO Advanced Study Institute directed by J.E. Bresenham, R.A. Earnshaw, M.L.V. Pitteway. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985.
Find full textSteeg, Evan Whitney *. Neural network algorithms for RNA secondary structure prediction. 1989.
Find full textWang, Jason T. L., Bruce A. Shapiro, and Dennis Shasha, eds. Pattern Discovery in Biomolecular Data. Oxford University Press, 1999. http://dx.doi.org/10.1093/oso/9780195119404.001.0001.
Full textErpen, Mauro Luiz, André Luiz Aquere de Cerqueira e. Souza, Clóvis Neumann, and Maria Cristina Bueno Coelho. Análise de Sucesso na Indústria da Construção Civil Utilizando Redes Neurais Artificiais. Edited by Marcia Alessandra Arantes Marques. Bookerfield Editora, 2021. http://dx.doi.org/10.53268/bkf21090400.
Full textErpen, Mauro Luiz, André Luiz Aquere de Cerqueira e. Souza, Clóvis Neumann, and Maria Cristina Bueno Coelho. Análise de Sucesso na Indústria da Construção Civil Utilizando Redes Neurais Artificiais. Edited by Marcia Alessandra Arantes Marques. Bookerfield Editora, 2021. http://dx.doi.org/10.53268/bkf21090400.
Full textLehmann, Nielsen Kåre, ed. Serial analysis of gene expression (SAGE): Methods and protocols. Totowa, N.J: Humana Press, 2008.
Find full textBook chapters on the topic "RSA algorithm"
Smart, Nigel P. "The “Naive” RSA Algorithm." In Cryptography Made Simple, 295–311. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21936-3_15.
Full textShaheen, Bushra, and Farheen Siddiqui. "Comparison Between RSA Algorithm and Modified RSA Algorithm Used in Cloud Computing." In Inventive Computation Technologies, 218–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_24.
Full textSahoo, Aradhana, Pratyasha Mohanty, and Purna Chandra Sethi. "Image Encryption Using RSA Algorithm." In Intelligent Systems, 641–52. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0901-6_56.
Full textChang, Zhenghui, and Pengfei Gong. "Optimization of Prime Decision Algorithm in RSA Algorithm." In Proceedings of the 11th International Conference on Computer Engineering and Networks, 277–83. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6554-7_32.
Full textYang, Shang-Yi, Po-Chun Kuo, Bo-Yin Yang, and Chen-Mou Cheng. "Gauss Sieve Algorithm on GPUs." In Topics in Cryptology – CT-RSA 2017, 39–57. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52153-4_3.
Full textQiao, Guopei, and Kwok-Yan Lam. "RSA Signature Algorithm for Microcontroller Implementation." In Lecture Notes in Computer Science, 353–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_32.
Full textMay, Alexander. "Using LLL-Reduction for Solving RSA and Factorization Problems." In The LLL Algorithm, 315–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02295-1_10.
Full textJoux, Antoine, and Vanessa Vitse. "A Variant of the F4 Algorithm." In Topics in Cryptology – CT-RSA 2011, 356–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19074-2_23.
Full textPatarin, Jacques, Nicolas Courtois, and Louis Goubin. "FLASH, a Fast Multivariate Signature Algorithm." In Topics in Cryptology — CT-RSA 2001, 298–307. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45353-9_22.
Full textJiao, Lin, Dengguo Feng, Yonglin Hao, Xinxin Gong, and Shaoyu Du. "FAN: A Lightweight Authenticated Cryptographic Algorithm." In Topics in Cryptology – CT-RSA 2021, 299–325. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75539-3_13.
Full textConference papers on the topic "RSA algorithm"
Aiswarya, P. M., Archana Raj, Dona John, Liya Martin, and G. Sreenu. "Binary RSA encryption algorithm." In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7987940.
Full textRui, Wang, Chen Ju, and Duan Guangwen. "A k-RSA algorithm." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6013537.
Full textAswathy, B. G., and R. Resmi. "Modified RSA public key algorithm." In 2014 First International Conference on Computational Systems and Communications (ICCSC). IEEE, 2014. http://dx.doi.org/10.1109/compsc.2014.7032657.
Full textDhakar, Ravi Shankar, Amit Kumar Gupta, and Prashant Sharma. "Modified RSA Encryption Algorithm (MREA)." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.74.
Full textAl-Hamami, Alaa Hussein, and Ibrahem Abdallah Aldariseh. "Enhanced Method for RSA Cryptosystem Algorithm." In 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 2012. http://dx.doi.org/10.1109/acsat.2012.102.
Full textChhabra, Aayush, and Srushti Mathur. "Modified RSA Algorithm: A Secure Approach." In 2011 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2011. http://dx.doi.org/10.1109/cicn.2011.117.
Full textChittala, Aarti, Preethi Mummini, and P. Suresh Verma. "Secure Autonomic Communication using RSA Algorithm." In 2006 International Conference on Advanced Computing and Communications. IEEE, 2006. http://dx.doi.org/10.1109/adcom.2006.4289860.
Full textSavić, Dragan, and Slobodan Damjanović. "The Attacks on the RSA Algorithm." In Sinteza 2016. Belgrade, Serbia: Singidunum University, 2016. http://dx.doi.org/10.15308/sinteza-2016-131-136.
Full textThombre, Ritu, and Babita Jajodia. "Experimental Analysis of Attacks on RSA & Rabin Cryptosystems using Quantum Shor’s Algorithm." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.74.
Full textDivya, S., B. Deepthi Reddy, and D. Sravanthi. "Cipher Text Design with Asymmetric RSA Algorithm." In National Conference on Computer Security, Image Processing, Graphics, Mobility and Analytics. AI Publications, 2016. http://dx.doi.org/10.22161/ijaers/si.14.
Full textReports on the topic "RSA algorithm"
Randall, J., B. Kaliski, J. Brainard, and S. Turner. Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS). RFC Editor, September 2010. http://dx.doi.org/10.17487/rfc5990.
Full textSury, O. Use of the SHA-256 Algorithm with RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records. RFC Editor, April 2012. http://dx.doi.org/10.17487/rfc6594.
Full textAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Full textJones, M. Using RSA Algorithms with CBOR Object Signing and Encryption (COSE) Messages. RFC Editor, September 2017. http://dx.doi.org/10.17487/rfc8230.
Full textJansen, J. Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC. RFC Editor, October 2009. http://dx.doi.org/10.17487/rfc5702.
Full textSchaad, J., B. Kaliski, and R. Housley. Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, June 2005. http://dx.doi.org/10.17487/rfc4055.
Full textAmela, R., R. Badia, S. Böhm, R. Tosi, C. Soriano, and R. Rossi. D4.2 Profiling report of the partner’s tools, complete with performance suggestions. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.2.023.
Full textFluhr, Robert, and Volker Brendel. Harnessing the genetic diversity engendered by alternative gene splicing. United States Department of Agriculture, December 2005. http://dx.doi.org/10.32747/2005.7696517.bard.
Full textGur, Amit, Edward Buckler, Joseph Burger, Yaakov Tadmor, and Iftach Klapp. Characterization of genetic variation and yield heterosis in Cucumis melo. United States Department of Agriculture, January 2016. http://dx.doi.org/10.32747/2016.7600047.bard.
Full text