Academic literature on the topic 'RSA algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RSA algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RSA algorithm"

1

Kuljanski, Sonja. "RSA algorithm." Vojnotehnicki glasnik 58, no. 3 (2010): 65–77. http://dx.doi.org/10.5937/vojtehg1003065k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aminudin and Ilyas Nuryasin. "Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 4 (2021): 768–73. http://dx.doi.org/10.29207/resti.v5i4.3297.

Full text
Abstract:
The RSA algorithm is one of the cryptographic algorithms with an asymmetric model where the algorithm has two keys, namely the public key and the private key. However, as time goes on, these algorithms are increasingly exposed to security holes and make this algorithm vulnerable to being hacked by people who do not have authority. The vulnerability stems from the algorithm's public keys (e and n). The strength of the RSA algorithm is based on the difficulty of factoring two prime numbers that are generated during the key generation process, if these values ​​can be known using certain methods,
APA, Harvard, Vancouver, ISO, and other styles
3

Parkash, Vivek. "Shift Ciphers and RSA - Encryption Algorithm." International Journal of Science and Research (IJSR) 12, no. 2 (2023): 996–97. http://dx.doi.org/10.21275/sr23217184311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Li. "Application of Data Image Encryption Technology in Computer Network Information Security." Mathematical Problems in Engineering 2022 (July 21, 2022): 1–7. http://dx.doi.org/10.1155/2022/8963756.

Full text
Abstract:
In order to solve the practical problem that the security of computer network information cannot be guaranteed, which seriously affects the network performance, the author proposes a public key data encryption system based on PKI. The system proposed by the author is based on the public key cryptographic algorithm RSA, including implementation of data encryption and digital signature and key distribution, an improved RSA algorithm is proposed for the slow speed of RSA. The result obtained is as follows: after reasonable selection of parameters and the use of optimized algorithms (also known as
APA, Harvard, Vancouver, ISO, and other styles
5

Zajac, Bernard. "RSA algorithm factored." Computer Fraud & Security Bulletin 1994, no. 6 (1994): 2. http://dx.doi.org/10.1016/0142-0496(94)90109-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Milenković, Branislav, Đorđe Jovanović, and Mladen Krstić. "Mechanical engineering design optimization using reptile search algorithm." Scientific Technical Review 72, no. 1 (2022): 22–26. http://dx.doi.org/10.5937/str2201022m.

Full text
Abstract:
Optimization algorithms plays a vital role in mechanical engineering. In this paper we have demonstrated how the Reptile Search Algorithm (RSA) algorithm is able to solve classical engineering design problems. In the first part, the biological reference, as well as a detailed overview of the algorithm is given. Afterwards, the RSA algorithm and the potential to solve the machine engineering design class of problems is given. The source code for this algorithm was written using MATLAB R2020a software suite. The Reptile Search Algorithm (RSA) algorithm was used for optimization problems in the f
APA, Harvard, Vancouver, ISO, and other styles
7

Shin, Seung-Hyeok, Won-Sok Yoo, and Hojong Choi. "Development of Public Key Cryptographic Algorithm Using Matrix Pattern for Tele-Ultrasound Applications." Mathematics 7, no. 8 (2019): 752. http://dx.doi.org/10.3390/math7080752.

Full text
Abstract:
A novel public key cryptographic algorithm using a matrix pattern is developed to improve encrypting strength. Compared to the Rivest–Sharmir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) algorithms, our proposed algorithm has superior encrypting strength due to several unknown quantities and one additional sub-equation during the encrypting process. Our proposed algorithm also provides a faster encoding/decoding speed when the patient’s images for tele-ultrasound applications are transmitted/received, compared to the RSA and ECC encrypting algorithms, because it encodes/decodes the plai
APA, Harvard, Vancouver, ISO, and other styles
8

Talunohi, Iwada Grawilser, Ibnu Jaki Lubis, Sutarman Sutarman, and Ade Candra. "Performance Comparison Analysis of Multi Prime RSA and Multi Power RSA." CESS (Journal of Computer Engineering, System and Science) 8, no. 2 (2023): 576. http://dx.doi.org/10.24114/cess.v8i2.47350.

Full text
Abstract:
Saat ini cukup banyak algoritma yang digunakan untuk pengamanan informasi dalam sistem atau perangkat lunak. Masing-masing algoritma tersebut memiliki tingkat waktu dalam key generate, enrkripsi dan dekripsi yang berbeda-beda. Dalam menggunakan algoritma tersebut harus mempertimbangkan waktu jika ingin menerapkan dalam suatu sistem atau perangkat lunak. Dalam penelitian ini, akan melakukan perbandingan kinerja dari dua algoritma asimetris yaitu Multi Power RSA dan Multi Prime RSA yang masing-masing merupakan varian dari RSA. Algoritma ini terdiri dari 2 kunci yaitu kunci publik dan kunci priva
APA, Harvard, Vancouver, ISO, and other styles
9

Balasubramanian, Dr Kannan, M. Arun, and Dr K. R. Sekar. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security 2, no. 2 (2022): 1–4. http://dx.doi.org/10.54105/ijcns.b1421.112222.

Full text
Abstract:
The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose concealing the publicly disclosed
APA, Harvard, Vancouver, ISO, and other styles
10

Dr., Kannan Balasubramanian, Arun M., and K. R. Sekar Dr. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security (IJCNS) 2, no. 2 (2022): 1–4. https://doi.org/10.54105/ijcns.B1421.112222.

Full text
Abstract:
<strong>Abstract: </strong>The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose conceal
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "RSA algorithm"

1

Таранова, Д. В. "Шифрування з відкритим кодом. Алгоритм RSA". Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Романюк, О. О., та М. П. Смаглюк. "Програмна реалізація алгоритму шифрування RSA". Thesis, Сумський державний університет, 2017. http://essuir.sumdu.edu.ua/handle/123456789/64443.

Full text
Abstract:
Криптографічні системи з відкритим ключем в даний час широко застосовуються в різних мережевих протоколах. Асиметричне шифрування на основі відкритого ключа RSA (розшифровується, як Rivest, Shamir and Aldeman - творці алгоритму) використовує більшість продуктів на ринку інформаційної безпеки. Його криптостійкість грунтується на складності розкладання великих чисел на множники.
APA, Harvard, Vancouver, ISO, and other styles
4

Дяченко, Є., М. Кір'ян та С. Танський. "Реалізація алгоритму RSA з використанням новітніх WEB-технологій". Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43353.

Full text
Abstract:
Розвиток WEB-технологій має передове значення у розвитку науки, адже в наш час саме Інтернет є основним джерелом та провідником знань. Людина, яка має доступ до Інтернету, має доступ до всесвітньої бази інформації.
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Tuwaijry, Fahd A. A. "Fast algorithms for implementation of public-key cryptosystems : VLSI simulation of modified algorithm to increase the speed of public-key cryptosystem (RSA) implementation." Thesis, University of Bradford, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.282982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Průcha, Jan. "Elektronický geocaching." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220208.

Full text
Abstract:
The master’s thesis is focusing on electronization of worldwide known game geocaching. It contains introduction to classic geocashing, analysis of current status and outline of possible solution. The design of electronization is based on smart card Gemalto. Very important part of the thesis is cryptographic security, therefore there is explanation of symetric and asymetric cryptography. The digital signature of transmitted message is realized by RSA algorithm, which is supported by the Gemalto smart card. Due to future expandability, it is appropriate to use general protocol. For this reason w
APA, Harvard, Vancouver, ISO, and other styles
7

Nwaokocha, Martyns. "Shorův algoritmus v kvantové kryptografii." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-445457.

Full text
Abstract:
Kryptografie je velmi důležitým aspektem našeho každodenního života, protože poskytuje teoretický základ informační bezpečnosti. Kvantové výpočty a informace se také stávají velmi důležitou oblastí vědy kvůli mnoha aplikačním oblastem včetně kryptologie a konkrétněji v kryptografii veřejných klíčů. Obtížnost čísel do hlavních faktorů je základem některých důležitých veřejných kryptosystémů, jejichž klíčem je kryptosystém RSA . Shorův kvantový faktoringový al-goritmus využívá zejména kvantový interferenční účinek kvantového výpočtu k faktorovým semi-prime číslům v polynomiálním čase na kvantové
APA, Harvard, Vancouver, ISO, and other styles
8

Popovský, Michal. "Útoky postranními kanály." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218182.

Full text
Abstract:
It is very difficult in real-time breaking the cryptographic algorithms used at present. The Classical cryptoanalysis is based on finding weaknesses in the mathematical structure of the algorithm. Discovery of side channels caused a substantial change in this science. Side-channel attacks are based on incorrect physical implementation of cryptographic algorithms. This new way attack changes notions about cryptography and security of systems. This master´s thesis contains a detailed description of the whole problem of side channels and deals with side-channel attacks on the RSA asymmetric algor
APA, Harvard, Vancouver, ISO, and other styles
9

Zeitoun, Rina. "Méthodes algébriques pour l'analyse de sécurité des implantations d'algorithmes cryptographiques." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066310/document.

Full text
Abstract:
Le 10ème problème de Hilbert, consistant à trouver les solutions entières d'équations polynomiales est un problème crucial en cryptanalyse. Si ce dernier a été prouvé indécidable, Coppersmith publia en 1996 une méthode basée sur la réduction de réseaux permettant de trouver efficacement l'ensemble des petites solutions de certaines équations polynomiales. De nombreuses applications de cette méthode ont vu le jour dans le domaine de la cryptanalyse à clé publique, notamment lorsque le cryptosystème est exécuté sur un système embarqué et qu'une partie de la clé secrète est dévoilée par la réalis
APA, Harvard, Vancouver, ISO, and other styles
10

Zeitoun, Rina. "Méthodes algébriques pour l'analyse de sécurité des implantations d'algorithmes cryptographiques." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066310.

Full text
Abstract:
Le 10ème problème de Hilbert, consistant à trouver les solutions entières d'équations polynomiales est un problème crucial en cryptanalyse. Si ce dernier a été prouvé indécidable, Coppersmith publia en 1996 une méthode basée sur la réduction de réseaux permettant de trouver efficacement l'ensemble des petites solutions de certaines équations polynomiales. De nombreuses applications de cette méthode ont vu le jour dans le domaine de la cryptanalyse à clé publique, notamment lorsque le cryptosystème est exécuté sur un système embarqué et qu'une partie de la clé secrète est dévoilée par la réalis
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "RSA algorithm"

1

Koutincho, S. Vvedenie v teoriju c isel: Algoritm RSA. Postmarket, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Vuibert, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Earnshaw, Rae A. Fundamental Algorithms for Computer Graphics: NATO Advanced Study Institute directed by J.E. Bresenham, R.A. Earnshaw, M.L.V. Pitteway. Springer Berlin Heidelberg, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Topics in Cryptology - CT-RSA 2012: The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012, Proceedings. Springer London, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Steeg, Evan Whitney *. Neural network algorithms for RNA secondary structure prediction. 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nair, Raveendranath U., Hema Singh, Vineetha Joy, and Vishal G. Padwal. Optimization of Multilayered Radar Absorbing Structures (RAS) Using Nature Inspired Algorithm. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nair, Raveendranath U., Hema Singh, Vineetha Joy, and Vishal G. Padwal. Optimization of Multilayered Radar Absorbing Structures (RAS) Using Nature Inspired Algorithm. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Optimization of Multilayered Radar Absorbing Structures (RAS) Using Nature Inspired Algorithm. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Optimization of Multilayered Radar Absorbing Structures (RAS) Using Nature Inspired Algorithm. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Implementierung Einer Verschlusselten Netzwerkkommunikation Unter der Verwendung Von Python Sockets und des Rsa-Algorithmus. GRIN Verlag GmbH, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "RSA algorithm"

1

Smart, Nigel P. "The “Naive” RSA Algorithm." In Cryptography Made Simple. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21936-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shaheen, Bushra, and Farheen Siddiqui. "Comparison Between RSA Algorithm and Modified RSA Algorithm Used in Cloud Computing." In Inventive Computation Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sahoo, Aradhana, Pratyasha Mohanty, and Purna Chandra Sethi. "Image Encryption Using RSA Algorithm." In Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0901-6_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Fuzhe, Junnan Guo, Lianfa Zhang, and Wenlin Han. "Research on Improved Double RSA Algorithm Based on RSA." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-6901-0_126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chang, Zhenghui, and Pengfei Gong. "Optimization of Prime Decision Algorithm in RSA Algorithm." In Proceedings of the 11th International Conference on Computer Engineering and Networks. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6554-7_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Shang-Yi, Po-Chun Kuo, Bo-Yin Yang, and Chen-Mou Cheng. "Gauss Sieve Algorithm on GPUs." In Topics in Cryptology – CT-RSA 2017. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52153-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qiao, Guopei, and Kwok-Yan Lam. "RSA Signature Algorithm for Microcontroller Implementation." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

May, Alexander. "Using LLL-Reduction for Solving RSA and Factorization Problems." In The LLL Algorithm. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02295-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patarin, Jacques, Nicolas Courtois, and Louis Goubin. "FLASH, a Fast Multivariate Signature Algorithm." In Topics in Cryptology — CT-RSA 2001. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45353-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jiao, Lin, Dengguo Feng, Yonglin Hao, Xinxin Gong, and Shaoyu Du. "FAN: A Lightweight Authenticated Cryptographic Algorithm." In Topics in Cryptology – CT-RSA 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75539-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RSA algorithm"

1

Zhang, Kun. "The Mathematical Principles of RSA Encryption Algorithm." In 2024 3rd International Conference on Artificial Intelligence and Computer Information Technology (AICIT). IEEE, 2024. http://dx.doi.org/10.1109/aicit62434.2024.10730074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zeng, Zhejun, Ning Lin, Qunli Xiao, et al. "Improving Blockchain Privacy Security Based on Improved RSA Algorithm." In 2024 5th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC). IEEE, 2024. https://doi.org/10.1109/isceic63613.2024.10810177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumari, Aarti, Utpal Garain, Sanghamitra Bandyopadhyay, Girish Mishra, Saibal K. Pal, and Malay Bhattacharyya. "RSA Cryptanalysis: An Elitist Genetic Algorithm for Integer Factorization." In 2025 IEEE Symposium on Computational Intelligence in Security, Defence and Biometrics Companion (CISDB Companion). IEEE, 2025. https://doi.org/10.1109/cisdbcompanion65092.2025.11010442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Zhiying, Chunhua Cao, Ruopengyu Xu, Chenglian Liu, and Passino K. M. Bi. "Analysis of Two Papers Based on RSA Algorithm: Plagiarism Investigation of HRSA Algorithm." In 2024 14th International Conference on Information Technology in Medicine and Education (ITME). IEEE, 2024. https://doi.org/10.1109/itme63426.2024.00098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aiswarya, P. M., Archana Raj, Dona John, Liya Martin, and G. Sreenu. "Binary RSA encryption algorithm." In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7987940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rui, Wang, Chen Ju, and Duan Guangwen. "A k-RSA algorithm." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6013537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dhakar, Ravi Shankar, Amit Kumar Gupta, and Prashant Sharma. "Modified RSA Encryption Algorithm (MREA)." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aswathy, B. G., and R. Resmi. "Modified RSA public key algorithm." In 2014 First International Conference on Computational Systems and Communications (ICCSC). IEEE, 2014. http://dx.doi.org/10.1109/compsc.2014.7032657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Hamami, Alaa Hussein, and Ibrahem Abdallah Aldariseh. "Enhanced Method for RSA Cryptosystem Algorithm." In 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 2012. http://dx.doi.org/10.1109/acsat.2012.102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chittala, Aarti, Preethi Mummini, and P. Suresh Verma. "Secure Autonomic Communication using RSA Algorithm." In 2006 International Conference on Advanced Computing and Communications. IEEE, 2006. http://dx.doi.org/10.1109/adcom.2006.4289860.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "RSA algorithm"

1

Housley, R., and S. Turner. Use of the RSA-KEM Algorithm in the Cryptographic Message Syntax (CMS). RFC Editor, 2025. https://doi.org/10.17487/rfc9690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Randall, J., B. Kaliski, J. Brainard, and S. Turner. Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sury, O. Use of the SHA-256 Algorithm with RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, M. Using RSA Algorithms with CBOR Object Signing and Encryption (COSE) Messages. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tayeb, Shahab. Intelligent Blind Crossings for Suburban and Rural Intersections. Mineta Transportation Institute, 2025. https://doi.org/10.31979/mti.2024.2351.

Full text
Abstract:
Blind intersections in suburban and rural areas pose significant safety challenges due to limited visibility and inadequate infrastructure. This project proposes an innovative solution leveraging the Internet of Vehicles (IoV) paradigm, utilizing connected and autonomous vehicles (CAVs) for seamless communication to enhance safety at these intersections. The research focuses on developing a specialized Road-Side Unit (RSU) system equipped with a Virtual Traffic Light Algorithm implemented on a Field-Programmable Gate Array (FPGA). Key stakeholders, including transportation authorities, vehicle
APA, Harvard, Vancouver, ISO, and other styles
7

Jansen, J. Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schaad, J., B. Kaliski, and R. Housley. Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Amela, R., R. Badia, S. Böhm, R. Tosi, C. Soriano, and R. Rossi. D4.2 Profiling report of the partner’s tools, complete with performance suggestions. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.2.023.

Full text
Abstract:
This deliverable focuses on the proling activities developed in the project with the partner's applications. To perform this proling activities, a couple of benchmarks were dened in collaboration with WP5. The rst benchmark is an embarrassingly parallel benchmark that performs a read and then multiple writes of the same object, with the objective of stressing the memory and storage systems and evaluate the overhead when these reads and writes are performed in parallel. A second benchmark is dened based on the Continuation Multi Level Monte Carlo (C-MLMC) algorithm. While this algorithm is norm
APA, Harvard, Vancouver, ISO, and other styles
10

Fluhr, Robert, and Volker Brendel. Harnessing the genetic diversity engendered by alternative gene splicing. United States Department of Agriculture, 2005. http://dx.doi.org/10.32747/2005.7696517.bard.

Full text
Abstract:
Our original objectives were to assess the unexplored dimension of alternative splicing as a source of genetic variation. In particular, we sought to initially establish an alternative splicing database for Arabidopsis, the only plant for which a near-complete genome has been assembled. Our goal was to then use the database, in part, to advance plant gene prediction programs that are currently a limiting factor in annotating genomic sequence data and thus will facilitate the exploitation of the ever increasing quantity of raw genomic data accumulating for plants. Additionally, the database was
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!