Academic literature on the topic 'RSA algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RSA algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "RSA algorithm"
Kuljanski, Sonja. "RSA algorithm." Vojnotehnicki glasnik 58, no. 3 (2010): 65–77. http://dx.doi.org/10.5937/vojtehg1003065k.
Full textAminudin and Ilyas Nuryasin. "Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 4 (2021): 768–73. http://dx.doi.org/10.29207/resti.v5i4.3297.
Full textParkash, Vivek. "Shift Ciphers and RSA - Encryption Algorithm." International Journal of Science and Research (IJSR) 12, no. 2 (2023): 996–97. http://dx.doi.org/10.21275/sr23217184311.
Full textLi, Li. "Application of Data Image Encryption Technology in Computer Network Information Security." Mathematical Problems in Engineering 2022 (July 21, 2022): 1–7. http://dx.doi.org/10.1155/2022/8963756.
Full textZajac, Bernard. "RSA algorithm factored." Computer Fraud & Security Bulletin 1994, no. 6 (1994): 2. http://dx.doi.org/10.1016/0142-0496(94)90109-0.
Full textMilenković, Branislav, Đorđe Jovanović, and Mladen Krstić. "Mechanical engineering design optimization using reptile search algorithm." Scientific Technical Review 72, no. 1 (2022): 22–26. http://dx.doi.org/10.5937/str2201022m.
Full textShin, Seung-Hyeok, Won-Sok Yoo, and Hojong Choi. "Development of Public Key Cryptographic Algorithm Using Matrix Pattern for Tele-Ultrasound Applications." Mathematics 7, no. 8 (2019): 752. http://dx.doi.org/10.3390/math7080752.
Full textTalunohi, Iwada Grawilser, Ibnu Jaki Lubis, Sutarman Sutarman, and Ade Candra. "Performance Comparison Analysis of Multi Prime RSA and Multi Power RSA." CESS (Journal of Computer Engineering, System and Science) 8, no. 2 (2023): 576. http://dx.doi.org/10.24114/cess.v8i2.47350.
Full textBalasubramanian, Dr Kannan, M. Arun, and Dr K. R. Sekar. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security 2, no. 2 (2022): 1–4. http://dx.doi.org/10.54105/ijcns.b1421.112222.
Full textDr., Kannan Balasubramanian, Arun M., and K. R. Sekar Dr. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security (IJCNS) 2, no. 2 (2022): 1–4. https://doi.org/10.54105/ijcns.B1421.112222.
Full textDissertations / Theses on the topic "RSA algorithm"
Таранова, Д. В. "Шифрування з відкритим кодом. Алгоритм RSA". Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43423.
Full textChatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.
Full textРоманюк, О. О., та М. П. Смаглюк. "Програмна реалізація алгоритму шифрування RSA". Thesis, Сумський державний університет, 2017. http://essuir.sumdu.edu.ua/handle/123456789/64443.
Full textДяченко, Є., М. Кір'ян та С. Танський. "Реалізація алгоритму RSA з використанням новітніх WEB-технологій". Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43353.
Full textAl-Tuwaijry, Fahd A. A. "Fast algorithms for implementation of public-key cryptosystems : VLSI simulation of modified algorithm to increase the speed of public-key cryptosystem (RSA) implementation." Thesis, University of Bradford, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.282982.
Full textPrůcha, Jan. "Elektronický geocaching." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220208.
Full textNwaokocha, Martyns. "Shorův algoritmus v kvantové kryptografii." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-445457.
Full textPopovský, Michal. "Útoky postranními kanály." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218182.
Full textZeitoun, Rina. "Méthodes algébriques pour l'analyse de sécurité des implantations d'algorithmes cryptographiques." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066310/document.
Full textZeitoun, Rina. "Méthodes algébriques pour l'analyse de sécurité des implantations d'algorithmes cryptographiques." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066310.
Full textBooks on the topic "RSA algorithm"
Schneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Vuibert, 2001.
Find full textEarnshaw, Rae A. Fundamental Algorithms for Computer Graphics: NATO Advanced Study Institute directed by J.E. Bresenham, R.A. Earnshaw, M.L.V. Pitteway. Springer Berlin Heidelberg, 1985.
Find full textTopics in Cryptology - CT-RSA 2012: The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012, Proceedings. Springer London, Limited, 2012.
Find full textSteeg, Evan Whitney *. Neural network algorithms for RNA secondary structure prediction. 1989.
Find full textNair, Raveendranath U., Hema Singh, Vineetha Joy, and Vishal G. Padwal. Optimization of Multilayered Radar Absorbing Structures (RAS) Using Nature Inspired Algorithm. Taylor & Francis Group, 2021.
Find full textNair, Raveendranath U., Hema Singh, Vineetha Joy, and Vishal G. Padwal. Optimization of Multilayered Radar Absorbing Structures (RAS) Using Nature Inspired Algorithm. Taylor & Francis Group, 2021.
Find full textOptimization of Multilayered Radar Absorbing Structures (RAS) Using Nature Inspired Algorithm. Taylor & Francis Group, 2021.
Find full textOptimization of Multilayered Radar Absorbing Structures (RAS) Using Nature Inspired Algorithm. Taylor & Francis Group, 2023.
Find full textImplementierung Einer Verschlusselten Netzwerkkommunikation Unter der Verwendung Von Python Sockets und des Rsa-Algorithmus. GRIN Verlag GmbH, 2017.
Find full textBook chapters on the topic "RSA algorithm"
Smart, Nigel P. "The “Naive” RSA Algorithm." In Cryptography Made Simple. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21936-3_15.
Full textShaheen, Bushra, and Farheen Siddiqui. "Comparison Between RSA Algorithm and Modified RSA Algorithm Used in Cloud Computing." In Inventive Computation Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_24.
Full textSahoo, Aradhana, Pratyasha Mohanty, and Purna Chandra Sethi. "Image Encryption Using RSA Algorithm." In Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0901-6_56.
Full textZhao, Fuzhe, Junnan Guo, Lianfa Zhang, and Wenlin Han. "Research on Improved Double RSA Algorithm Based on RSA." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-6901-0_126.
Full textChang, Zhenghui, and Pengfei Gong. "Optimization of Prime Decision Algorithm in RSA Algorithm." In Proceedings of the 11th International Conference on Computer Engineering and Networks. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6554-7_32.
Full textYang, Shang-Yi, Po-Chun Kuo, Bo-Yin Yang, and Chen-Mou Cheng. "Gauss Sieve Algorithm on GPUs." In Topics in Cryptology – CT-RSA 2017. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52153-4_3.
Full textQiao, Guopei, and Kwok-Yan Lam. "RSA Signature Algorithm for Microcontroller Implementation." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_32.
Full textMay, Alexander. "Using LLL-Reduction for Solving RSA and Factorization Problems." In The LLL Algorithm. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02295-1_10.
Full textPatarin, Jacques, Nicolas Courtois, and Louis Goubin. "FLASH, a Fast Multivariate Signature Algorithm." In Topics in Cryptology — CT-RSA 2001. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45353-9_22.
Full textJiao, Lin, Dengguo Feng, Yonglin Hao, Xinxin Gong, and Shaoyu Du. "FAN: A Lightweight Authenticated Cryptographic Algorithm." In Topics in Cryptology – CT-RSA 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75539-3_13.
Full textConference papers on the topic "RSA algorithm"
Zhang, Kun. "The Mathematical Principles of RSA Encryption Algorithm." In 2024 3rd International Conference on Artificial Intelligence and Computer Information Technology (AICIT). IEEE, 2024. http://dx.doi.org/10.1109/aicit62434.2024.10730074.
Full textZeng, Zhejun, Ning Lin, Qunli Xiao, et al. "Improving Blockchain Privacy Security Based on Improved RSA Algorithm." In 2024 5th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC). IEEE, 2024. https://doi.org/10.1109/isceic63613.2024.10810177.
Full textKumari, Aarti, Utpal Garain, Sanghamitra Bandyopadhyay, Girish Mishra, Saibal K. Pal, and Malay Bhattacharyya. "RSA Cryptanalysis: An Elitist Genetic Algorithm for Integer Factorization." In 2025 IEEE Symposium on Computational Intelligence in Security, Defence and Biometrics Companion (CISDB Companion). IEEE, 2025. https://doi.org/10.1109/cisdbcompanion65092.2025.11010442.
Full textLiu, Zhiying, Chunhua Cao, Ruopengyu Xu, Chenglian Liu, and Passino K. M. Bi. "Analysis of Two Papers Based on RSA Algorithm: Plagiarism Investigation of HRSA Algorithm." In 2024 14th International Conference on Information Technology in Medicine and Education (ITME). IEEE, 2024. https://doi.org/10.1109/itme63426.2024.00098.
Full textAiswarya, P. M., Archana Raj, Dona John, Liya Martin, and G. Sreenu. "Binary RSA encryption algorithm." In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7987940.
Full textRui, Wang, Chen Ju, and Duan Guangwen. "A k-RSA algorithm." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6013537.
Full textDhakar, Ravi Shankar, Amit Kumar Gupta, and Prashant Sharma. "Modified RSA Encryption Algorithm (MREA)." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.74.
Full textAswathy, B. G., and R. Resmi. "Modified RSA public key algorithm." In 2014 First International Conference on Computational Systems and Communications (ICCSC). IEEE, 2014. http://dx.doi.org/10.1109/compsc.2014.7032657.
Full textAl-Hamami, Alaa Hussein, and Ibrahem Abdallah Aldariseh. "Enhanced Method for RSA Cryptosystem Algorithm." In 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 2012. http://dx.doi.org/10.1109/acsat.2012.102.
Full textChittala, Aarti, Preethi Mummini, and P. Suresh Verma. "Secure Autonomic Communication using RSA Algorithm." In 2006 International Conference on Advanced Computing and Communications. IEEE, 2006. http://dx.doi.org/10.1109/adcom.2006.4289860.
Full textReports on the topic "RSA algorithm"
Housley, R., and S. Turner. Use of the RSA-KEM Algorithm in the Cryptographic Message Syntax (CMS). RFC Editor, 2025. https://doi.org/10.17487/rfc9690.
Full textRandall, J., B. Kaliski, J. Brainard, and S. Turner. Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5990.
Full textSury, O. Use of the SHA-256 Algorithm with RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6594.
Full textAllende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.
Full textJones, M. Using RSA Algorithms with CBOR Object Signing and Encryption (COSE) Messages. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8230.
Full textTayeb, Shahab. Intelligent Blind Crossings for Suburban and Rural Intersections. Mineta Transportation Institute, 2025. https://doi.org/10.31979/mti.2024.2351.
Full textJansen, J. Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5702.
Full textSchaad, J., B. Kaliski, and R. Housley. Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4055.
Full textAmela, R., R. Badia, S. Böhm, R. Tosi, C. Soriano, and R. Rossi. D4.2 Profiling report of the partner’s tools, complete with performance suggestions. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.2.023.
Full textFluhr, Robert, and Volker Brendel. Harnessing the genetic diversity engendered by alternative gene splicing. United States Department of Agriculture, 2005. http://dx.doi.org/10.32747/2005.7696517.bard.
Full text