Journal articles on the topic 'RSA algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'RSA algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Aminudin and Ilyas Nuryasin. "Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 4 (August 25, 2021): 768–73. http://dx.doi.org/10.29207/resti.v5i4.3297.
Full textKuljanski, Sonja. "RSA algorithm." Vojnotehnicki glasnik 58, no. 3 (2010): 65–77. http://dx.doi.org/10.5937/vojtehg1003065k.
Full textZajac, Bernard. "RSA algorithm factored." Computer Fraud & Security Bulletin 1994, no. 6 (June 1994): 2. http://dx.doi.org/10.1016/0142-0496(94)90109-0.
Full textBahjat Abdulrazzaq, Maiwan. "Selective Multi Keys to Modify RSA Algorithm." Journal of Zankoy Sulaimani - Part A 21, no. 1 (June 20, 2019): 99–106. http://dx.doi.org/10.17656/jzs.10748.
Full textAlguraby, Atyaf, and Mohammed Joudah Zaiter. "MULTI KEY ALGORITHM FOR SECURITY ENHANCEMENT OF RSA ALGORITHM USING MATLAB." Iraqi Journal of Information & Communications Technology 3, no. 1 (April 11, 2020): 1–10. http://dx.doi.org/10.31987/ijict.3.1.90.
Full textShin, Seung-Hyeok, Won-Sok Yoo, and Hojong Choi. "Development of Public Key Cryptographic Algorithm Using Matrix Pattern for Tele-Ultrasound Applications." Mathematics 7, no. 8 (August 17, 2019): 752. http://dx.doi.org/10.3390/math7080752.
Full textWibowo, Nur Cayo Hendro, Khotibul Umam, Albadru Muh Izul Khaq, and Favian Agung Rizki. "Komparasi Waktu Algoritma RSA dengan RSA-CRT Base On Computer." Walisongo Journal of Information Technology 2, no. 1 (June 17, 2020): 13. http://dx.doi.org/10.21580/wjit.2020.2.1.5402.
Full textSkobic, Velibor, Branko Dokic, and Zeljko Ivanovic. "Hardware modules of the RSA algorithm." Serbian Journal of Electrical Engineering 11, no. 1 (2014): 121–31. http://dx.doi.org/10.2298/sjee140114011s.
Full textRachmawati, Dian, Mohammad Andri Budiman, and William Andrei. "Comparison Of RSA Algorithm & Hybrid RSA-OTP Algorithm For Image Security." Journal of Physics: Conference Series 1235 (June 2019): 012076. http://dx.doi.org/10.1088/1742-6596/1235/1/012076.
Full textEt.al, R. Felista Sugirtha Lizy. "Image Encryption Using RK-RSA Algorithm in Aadhaar Card." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 4683–93. http://dx.doi.org/10.17762/turcomat.v12i3.1887.
Full textIhwani, Mohamad. "INFORMATION SECURITY MODEL BASED DIGITAL SIGNATURE ALGORITHM WITH RSA ALGORITHM." Computer Engineering, Science and System Journal 1, no. 1 (January 31, 2016): 15–20. http://dx.doi.org/10.24114/cess.v1i1.4037.
Full textDr Asha Ambhaikar, Mr Abhishek Guru,. "AES AND RSA-BASED HYBRID ALGORITHMS FOR MESSAGE ENCRYPTION & DECRYPTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 1, 2021): 273–79. http://dx.doi.org/10.17762/itii.v9i1.129.
Full textAditya, Gadhing Putra, Aminuddin Aminuddin, and Sofyan Arifianto. "Improvisasi Algoritma RSA Menggunakan Generate Key ESRKGS pada Instant Messaging Berbasis Socket TCP." Jurnal Repositor 2, no. 11 (December 4, 2020): 1444. http://dx.doi.org/10.22219/repositor.v2i11.731.
Full textObaid, Taleb Samad. "Study A Public Key in RSA Algorithm." European Journal of Engineering Research and Science 5, no. 4 (April 1, 2020): 395–98. http://dx.doi.org/10.24018/ejers.2020.5.4.1843.
Full textObaid, Taleb Samad. "Study A Public Key in RSA Algorithm." European Journal of Engineering and Technology Research 5, no. 4 (April 1, 2020): 395–98. http://dx.doi.org/10.24018/ejeng.2020.5.4.1843.
Full textEt.al, R. Felista Sugirtha Lizy. "Improvement of RSA Algorithm Using Euclidean Technique." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 4694–700. http://dx.doi.org/10.17762/turcomat.v12i3.1889.
Full textFalah Hameed Al Saffar, Najlae. "Steganography Algorithm Based RSA Cryptosystem." Journal of Engineering and Applied Sciences 14, no. 7 (December 31, 2019): 2240–43. http://dx.doi.org/10.36478/jeasci.2019.2240.2243.
Full textJones, Josh. "The RSA algorithm (abstract only)." ACM Communications in Computer Algebra 42, no. 1-2 (July 25, 2008): 74. http://dx.doi.org/10.1145/1394042.1394084.
Full textHe, Shufang, Yang Qiu, and Jing Xu. "Invalid-Resource-Aware Spectrum Assignment for Advanced-Reservation Traffic in Elastic Optical Network." Sensors 20, no. 15 (July 28, 2020): 4190. http://dx.doi.org/10.3390/s20154190.
Full textMarkelova, A. V. "Kleptographic (algorithmic) backdoors in the RSA key generator." Prikladnaya Diskretnaya Matematika, no. 55 (2022): 14–34. http://dx.doi.org/10.17223/20710410/55/2.
Full textBaek, Yoo-Jin. "Key Recovery Algorithm from Randomly-Given Bits of Multi-Prime RSA and Prime Power RSA." Journal of the Korea Institute of Information Security and Cryptology 26, no. 6 (December 31, 2016): 1401–11. http://dx.doi.org/10.13089/jkiisc.2016.26.6.1401.
Full textM. Abd Zaid, Mustafa, and Dr Soukaena Hassan. "Lightweight Rsa Algorithm Using Three Prime Numbers." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 293. http://dx.doi.org/10.14419/ijet.v7i4.36.23790.
Full textMohit, Prerna, and G. P. Biswas. "Modification of Traditional RSA into Symmetric-RSA Cryptosystems." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 66–73. http://dx.doi.org/10.4018/ijbdcn.2017010106.
Full textLaurentinus, Laurentinus, Harrizki Arie Pradana, Dwi Yuny Sylfania, and Fransiskus Panca Juniawan. "Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm." Jurnal Teknologi dan Sistem Komputer 8, no. 3 (April 19, 2020): 171–77. http://dx.doi.org/10.14710/jtsiskom.2020.13468.
Full textAini, Fifin Nur, Siti Amiroch, and Novita Eka Chandra. "Penggunaan Algoritma Vigenere Cipher dan RSA (Rivest-Shamir-Adleman) Untuk Keamanan Data Pembelian di PT Lamongan Marine Industry." Unisda Journal of Mathematics and Computer Science (UJMC) 6, no. 01 (June 30, 2020): 39–46. http://dx.doi.org/10.52166/ujmc.v6i01.2386.
Full textThomas, Ambili, and V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment." International Journal of Natural Computing Research 10, no. 2 (April 2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Full textLi, Zixiang, Mukund Nilakantan Janardhanan, Peter Nielsen, and Qiuhua Tang. "Mathematical models and simulated annealing algorithms for the robotic assembly line balancing problem." Assembly Automation 38, no. 4 (September 3, 2018): 420–36. http://dx.doi.org/10.1108/aa-09-2017-115.
Full textMadras, Neal, and Zhongrong Zheng. "On the swapping algorithm." Random Structures and Algorithms 22, no. 1 (November 18, 2002): 66–97. http://dx.doi.org/10.1002/rsa.10066.
Full textNazal, Muhammad Asghar, Reza Pulungan, and Mardhani Riasetiawan. "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 13, no. 3 (July 31, 2019): 273. http://dx.doi.org/10.22146/ijccs.47267.
Full textHussain, Md Equebal, and Mohammad Rashid Hussain. "Securing Cloud Data using RSA Algorithm." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 6, no. 4 (December 19, 2018): 96. http://dx.doi.org/10.3991/ijes.v6i4.9910.
Full textAzmi, Fadhillah, and Winda Erika. "DATA SECURITY ANALYSIS OF BLOCK CIPHER RSA CRYPTOGRAPHY ALGORITHM." Computer Engineering, Science and System Journal 2, no. 1 (January 31, 2017): 102–4. http://dx.doi.org/10.24114/cess.v2i1.4967.
Full textLi, You Guo. "Improved RSA Algorithm in Hardware Encryption." Applied Mechanics and Materials 543-547 (March 2014): 3610–13. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3610.
Full textZhang, C. N. "An improved binary algorithm for RSA." Computers & Mathematics with Applications 25, no. 6 (March 1993): 15–24. http://dx.doi.org/10.1016/0898-1221(93)90295-7.
Full textChithra, P. L., and C. Vishnu Priya. "Image Based Password using RSA Algorithm." International Journal of Computing Algorithm 5, no. 1 (June 15, 2016): 34–36. http://dx.doi.org/10.20894/ijcoa.101.005.001.008.
Full textShi, Ronghua. "A redundant binary algorithm for RSA." Journal of Computer Science and Technology 11, no. 4 (July 1996): 416–20. http://dx.doi.org/10.1007/bf02948485.
Full textAsthana, N., and S. Shridevi. "DECRYPTING RSA ENCRYPTION USING QUANTUM ALGORITHM." Advances in Mathematics: Scientific Journal 10, no. 2 (February 8, 2020): 729–42. http://dx.doi.org/10.37418/amsj.10.2.5.
Full textCandra, Ade, Mohammad Andri Budiman, and Dian Rachmawati. "On Factoring The RSA Modulus Using Tabu Search." Data Science: Journal of Computing and Applied Informatics 1, no. 1 (July 18, 2017): 30–37. http://dx.doi.org/10.32734/jocai.v1.i1-65.
Full textSingh, Sukhpreet, and Er Kumar Saurabh. "Providing Security in Data Aggregation using RSA algorithm." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 60–65. http://dx.doi.org/10.24297/ijct.v3i1a.2729.
Full textKIJKO, Tomasz, and Michał WROŃSKI. "COMPARISON OF ALGORITHMS FOR FACTORIZATION OF LARGE NUMBERS HAVING SEVERAL DISTINCT PRIME FACTORS." National Security Studies 6, no. 2 (December 5, 2014): 151–62. http://dx.doi.org/10.37055/sbn/135227.
Full textSuhandinata, Sebastian, Reyhan Achmad Rizal, Dedy Ongky Wijaya, Prabhu Warren, and Srinjiwi Srinjiwi. "ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 6, no. 1 (December 10, 2019): 1–10. http://dx.doi.org/10.33330/jurteksi.v6i1.395.
Full textAminudin, Aminudin, Gadhing Putra Aditya, and Sofyan Arifianto. "RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol." Jurnal Teknologi dan Sistem Komputer 8, no. 2 (February 7, 2020): 113–20. http://dx.doi.org/10.14710/jtsiskom.8.2.2020.113-120.
Full textBudati, Anil Kumar, Ganesh Snv, Kumar Cherukupalli, Anil Kumar P., and Venkata Krishna Moorthy T. "High speed data encryption technique with optimized memory based RSA algorithm for communications." Circuit World 47, no. 3 (June 22, 2021): 269–73. http://dx.doi.org/10.1108/cw-10-2020-0282.
Full textTahir, Ari Shawkat. "Design and Implementation of RSA Algorithm using FPGA." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 12 (September 22, 2015): 6361–67. http://dx.doi.org/10.24297/ijct.v14i12.1737.
Full textSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (March 6, 2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Full textWANG, Yahui, and Huanguo ZHANG. "Quantum Algorithm for Attacking RSA Based on Fourier Transform and Fixed-Point." Wuhan University Journal of Natural Sciences 26, no. 6 (December 2021): 489–94. http://dx.doi.org/10.1051/wujns/2021266489.
Full textHu, Xiao-Bing, Ming Wang, Mark S. Leeson, Ezequiel A. Di Paolo, and Hao Liu. "Deterministic Agent-Based Path Optimization by Mimicking the Spreading of Ripples." Evolutionary Computation 24, no. 2 (June 2016): 319–46. http://dx.doi.org/10.1162/evco_a_00156.
Full textAryanti, Aryanti, and Ikhthison Mekongga. "Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System." E3S Web of Conferences 31 (2018): 10007. http://dx.doi.org/10.1051/e3sconf/20183110007.
Full textAlekseev, A. P. "Analysis of secret-key algorithm vulnerability in RSA-cryptosystems." Infokommunikacionnye tehnologii 13, no. 4 (December 2015): 464–67. http://dx.doi.org/10.18469/ikt.2015.13.4.17.
Full textHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed, and Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (December 1, 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Full textAl-Shourbaji, Ibrahim, Na Helian, Yi Sun, Samah Alshathri, and Mohamed Abd Elaziz. "Boosting Ant Colony Optimization with Reptile Search Algorithm for Churn Prediction." Mathematics 10, no. 7 (March 23, 2022): 1031. http://dx.doi.org/10.3390/math10071031.
Full text