Academic literature on the topic 'Rsa decryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Rsa decryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Rsa decryption"
Gao, Ming Hu, and Hong Yuan Huang. "A New Efficient Variant of the Batch RSA Cryptosystem." Advanced Materials Research 756-759 (September 2013): 2660–62. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2660.
Full textEncinas, L. Hernández, J. Muñoz Masqué, and A. Queiruga Dios. "Large decryption exponents in RSA." Applied Mathematics Letters 16, no. 3 (April 2003): 293–95. http://dx.doi.org/10.1016/s0893-9659(03)80046-0.
Full textSann, Zarni, Thi Thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance comparison of asymmetric cryptography (case study-mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 105–11. http://dx.doi.org/10.34306/csit.v4i3.98.
Full textJ.L. Padmaja, Ch, V. S.Bhagavan, and B. Srinivas. "On using Aryabhatta Remainder Theorem to Decrypt a Message with RPrime and Rebalanced RSA." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 758. http://dx.doi.org/10.14419/ijet.v7i2.7.10940.
Full textSann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.
Full textHariyanto, Eko Hariyanto, Muhammad Zarlis, Darmeli Nasution Nasution, and Sri Wahyuni. "Analysis Aryabhata Remainder Theorem On Rivest Shamir Adleman (RSA) Cryptography." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (July 22, 2020): 88–93. http://dx.doi.org/10.34306/csit.v5i2.183.
Full textAryanti, Aryanti, and Ikhthison Mekongga. "Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System." E3S Web of Conferences 31 (2018): 10007. http://dx.doi.org/10.1051/e3sconf/20183110007.
Full textABDULHAMID, Mohanad, and Nyagathu GICHUKI. "Comparative Study of Cryptographic Algorithms." International Journal of Information Security and Cybercrime 8, no. 1 (June 28, 2019): 13–22. http://dx.doi.org/10.19107/ijisc.2019.01.01.
Full textFlynn, Sofia. "An Investigation Into the Mathematics of Decryption Techniques in RSA Encryption, With an Implementation in Python." Spring 2021, no. 2 (July 31, 2021): 6–18. http://dx.doi.org/10.48091/gsr.v1i2.18.
Full textChristina C, Merlyne Sandra, Karthika M, Vasanthi M, and Vinotha B. "Video Encryption and Decryption using RSA Algorithm." International Journal of Engineering Trends and Technology 33, no. 7 (March 25, 2016): 328–32. http://dx.doi.org/10.14445/22315381/ijett-v33p263.
Full textDissertations / Theses on the topic "Rsa decryption"
Lisoněk, David. "Šifrování SMS pro mobilní komunikaci." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235448.
Full textJoseph, George. "Design and implementation of high-speed algorithms for public-key cryptosystems." Diss., Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-06092005-122043.
Full textAlzaabi, Mohamed Abdulla Hasan Saif. "New cryptanalysis and modelling for wireless networking." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/17115.
Full textLuque, González Jorge, and Fernandez Ignacio Arenchaga. "Data Encryption on a Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9352.
Full textEn este proyecto encontraras un estudio sobre diferentes algoritmos de encriptación, que son usados para salvaguardar la información en mensajes por la red. Además hemos desarrollado una aplicación cliente-servidor que enviara información a través de la red de forma segura. Hay dos tipos de algoritmos de encriptación, los simétricos y los asimétricos. Ambos tipos de algoritmos son utilizados para establecer la comunicación, el asimétrico (RSA) es utilizado para establecer la clave del simétrico y a partir de entonces se utilizara exclusivamente el algoritmo simétrico (Blowfish).
Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textChang, Chien-Cheng, and 張建誠. "The Design of a RSA Encryption/Decryption Circuit." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/61393486894775458082.
Full text國立臺灣科技大學
電子工程系
88
The RSA encryption algorithm is widely used in communication and data security system. It takes much time to perform because of the RSA algorithm using more than 512-bit word lengths to guarantee security. Developing a high speed RSA encryption circuit which takes less gate count and can carry out its layout easily, will be a challenge. In this thesis, a 1024-bit RSA encryption circuit that is constructed by two 1024-bit adders is proposed. Based on the consideration of speed and regularity, a 1024-bit hierarchical carry skip adder consisting of 8 bits ripple adders is proposed. The adder only takes 9.4ns to perform a 1024-bit addition with 0.35μm SPQM cell library. The resulting RSA circuit can output a 10240-bit encrypted message every 22ms at the operating frequency of 72 MHz. Its die size is 3.7x3.7mm^2 and consumes 633mw. Moreover, the design of the proposed RSA circuit is modularized in a bit-sliced manner so that it can be expanded easily to a longer word length.
Jwo, Hung-Ming, and 卓宏洺. "Research of RSA Encryption/Decryption Based on Embedded System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/tcf94z.
Full text國立臺灣科技大學
電子工程系
94
Human life gets more and more dependent on internet as it grows rapidly. By means of internet, we can not only transfer text, audio, and video data, but also buy goods and pay for them. But in a public domain like internet, private personal information can be captured easily and therefore encryption is necessary to prevent captured data readable. Based on a developing platform with Samsung S3C2410 as its CPU, this thesis develops a internet transfer application that encrypts files with RSA before sending out via internet, and decrypts them after receiving at receiver end. RSA is currently the most popular public key cryptographic system. It's quite appropriate to use when transferring private information under public domain and it can also be used for digital signature and identification certification. S3C2410, a touch-panel-supported CPU produced by Samsung, is considered suitable for mobile devices such as PDA. Linux, the operating system we use on the developing platform, is capable of great portability, efficient network transfer, support for a great deal of peripherals, and short time to market, and most important of all is that it's open source.
陳嘉耀. "An Efficient Decryption Method for RSA Cryptosystem And Implementation." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/71835300207564971666.
Full textBih-Ching, Yeh. "512-bit RSA Public Key Data Encryption/Decryption Chip Design." 1997. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0009-0112200611290358.
Full textZeng, Xi-Zhe, and 曾希哲. "The Design and Analysis of a RSA Encryption/Decryption Chip." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/36112321014998661900.
Full text國立海洋大學
電機工程學系
88
The role of cryptography is more important to prevent the computer- and communication-based crime in recent years. Many applications of cryptographic methods have been proposed recently from electronic mail, trading, and banking to network security. In this thesis, the implementation of a 512 bits public key cryptosystem of RSA encryption/decryption chip is presented based on the Montgomery algorithm to simplify the complexity of exponential modular operation in RSA algorithm. The architecture of chip includes two components: modular and multiplier that are implemented based on the 257 bits pipelining systolic array to achieve a low die area. We applied the VHDL (VHSIC Hardware Description Language) to accomplish its design entry. This chip completed by using FPGA (Field Programmable Gate Array). It’s clock rate can reach 43.5 MHz and the baud rate is 28.2 Kbits/sec.
Books on the topic "Rsa decryption"
Martin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.
Full textBook chapters on the topic "Rsa decryption"
Bai, Xu, Lei Jiang, Xinxing Liu, and Jianlong Tan. "RSA Encryption/Decryption Implementation Based on Zedboard." In Trustworthy Computing and Services, 114–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47401-3_15.
Full textMaitra, Subhamoy, Santanu Sarkar, and Sourav Sen Gupta. "Publishing Upper Half of RSA Decryption Exponent." In Advances in Information and Computer Security, 25–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16825-3_3.
Full textMaitra, Subhamoy, and Santanu Sarkar. "Efficient CRT-RSA Decryption for Small Encryption Exponents." In Topics in Cryptology - CT-RSA 2010, 26–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11925-5_3.
Full textHuang, Zhangjie, Lei Hu, and Jun Xu. "Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization." In Information Security and Cryptology, 207–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16745-9_12.
Full textMcGregor, John Patrick, Yiqun Lisa Yin, and Ruby B. Lee. "A Traitor Tracing Scheme Based on RSA for Fast Decryption." In Applied Cryptography and Network Security, 56–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496137_5.
Full textWatanabe, Yohei, Keita Emura, and Jae Hong Seo. "New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters." In Topics in Cryptology – CT-RSA 2017, 432–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52153-4_25.
Full textSarkar, Santanu, and Subhamoy Maitra. "Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents." In Cryptographic Hardware and Embedded Systems – CHES 2012, 476–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33027-8_28.
Full textYen, Sung-Ming, Wei-Chih Lien, SangJae Moon, and JaeCheol Ha. "Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption." In Progress in Cryptology – Mycrypt 2005, 183–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11554868_13.
Full textPrakash, Ravi, Premkumar Chithaluru, Deepak Sharma, and P. Srikanth. "Implementation of Trapdoor Functionality to Two-Layer Encryption and Decryption by Using RSA-AES Cryptography Algorithms." In Nanoelectronics, Circuits and Communication Systems, 89–95. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0776-8_8.
Full textSahu, Madhusmita. "RSA Based Encryption and Decryption of Any Text with the Help of XOR Operation and Color Mapping Technique." In ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 545–52. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8461-5_62.
Full textConference papers on the topic "Rsa decryption"
Anane, Nadjia, Mohamed Anane, Hamid Bessalah, Mohamed Issad, and Khadidja Messaoudi. "RSA based encryption decryption of medical images." In 2010 7th International Multi-Conference on Systems, Signals and Devices (SSD). IEEE, 2010. http://dx.doi.org/10.1109/ssd.2010.5585539.
Full textWang, Suli, and Ganlai Liu. "File Encryption and Decryption System Based on RSA Algorithm." In 2011 International Conference on Computational and Information Sciences (ICCIS). IEEE, 2011. http://dx.doi.org/10.1109/iccis.2011.150.
Full textMandangan, Arif, Loh Chai Mei, Chang Ee Hung, and Che Haziqah Che Hussin. "Compression-RSA technique: A more efficient encryption-decryption procedure." In PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES. AIP Publishing LLC, 2014. http://dx.doi.org/10.1063/1.4882465.
Full textHung, Chang Ee, and Arif Mandangan. "Compression-RSA: New approach of encryption and decryption method." In PROCEEDINGS OF THE 20TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES: Research in Mathematical Sciences: A Catalyst for Creativity and Innovation. AIP, 2013. http://dx.doi.org/10.1063/1.4801103.
Full textXin Zhou and Xiaofei Tang. "Research and implementation of RSA algorithm for encryption and decryption." In 2011 6th International Forum on Strategic Technology (IFOST). IEEE, 2011. http://dx.doi.org/10.1109/ifost.2011.6021216.
Full textAsaduzzaman, Abu, Deepthi Gummadi, and Puskar Waichal. "A promising parallel algorithm to manage the RSA decryption complexity." In SoutheastCon 2015. IEEE, 2015. http://dx.doi.org/10.1109/secon.2015.7132926.
Full textYunfei Li, Qing Liu, Tong Li, and Wenming Xiao. "Two efficient methods to speed up the Batch RSA decryption." In 2010 Third International Workshop on Advanced Computational Intelligence (IWACI). IEEE, 2010. http://dx.doi.org/10.1109/iwaci.2010.5585105.
Full textNeto, Joao Carlos, Alexandre Ferreira Tenca, and Wilson Vicente Ruggiero. "CRT RSA decryption: Modular exponentiation based solely on Montgomery Multiplication." In 2015 49th Asilomar Conference on Signals, Systems and Computers. IEEE, 2015. http://dx.doi.org/10.1109/acssc.2015.7421164.
Full textGao, Sanshan, Shunqing Zhang, Michael Fu, Shugong Xu, and Weiping Li. "Cost-Efficient Parallel RSA Decryption with Integrated GPGPU and OpenCL." In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). IEEE, 2016. http://dx.doi.org/10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0101.
Full textAbdullah, Kamilah, Sumarni Abu Bakar, Nor Hanimah Kamis, and Hardi Aliamis. "RSA cryptosystem with fuzzy set theory for encryption and decryption." In PROCEEDINGS OF THE 13TH IMT-GT INTERNATIONAL CONFERENCE ON MATHEMATICS, STATISTICS AND THEIR APPLICATIONS (ICMSA2017). Author(s), 2017. http://dx.doi.org/10.1063/1.5012147.
Full text