Journal articles on the topic 'Rsa decryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Rsa decryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gao, Ming Hu, and Hong Yuan Huang. "A New Efficient Variant of the Batch RSA Cryptosystem." Advanced Materials Research 756-759 (September 2013): 2660–62. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2660.
Full textEncinas, L. Hernández, J. Muñoz Masqué, and A. Queiruga Dios. "Large decryption exponents in RSA." Applied Mathematics Letters 16, no. 3 (2003): 293–95. http://dx.doi.org/10.1016/s0893-9659(03)80046-0.
Full textSann, Zarni, Thi Thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance comparison of asymmetric cryptography (case study-mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2020): 105–11. http://dx.doi.org/10.34306/csit.v4i3.98.
Full textJ.L. Padmaja, Ch, V. S.Bhagavan, and B. Srinivas. "On using Aryabhatta Remainder Theorem to Decrypt a Message with RPrime and Rebalanced RSA." International Journal of Engineering & Technology 7, no. 2.7 (2018): 758. http://dx.doi.org/10.14419/ijet.v7i2.7.10940.
Full textSann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.
Full textHariyanto, Eko Hariyanto, Muhammad Zarlis, Darmeli Nasution Nasution, and Sri Wahyuni. "Analysis Aryabhata Remainder Theorem On Rivest Shamir Adleman (RSA) Cryptography." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (2020): 88–93. http://dx.doi.org/10.34306/csit.v5i2.183.
Full textAryanti, Aryanti, and Ikhthison Mekongga. "Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System." E3S Web of Conferences 31 (2018): 10007. http://dx.doi.org/10.1051/e3sconf/20183110007.
Full textABDULHAMID, Mohanad, and Nyagathu GICHUKI. "Comparative Study of Cryptographic Algorithms." International Journal of Information Security and Cybercrime 8, no. 1 (2019): 13–22. http://dx.doi.org/10.19107/ijisc.2019.01.01.
Full textFlynn, Sofia. "An Investigation Into the Mathematics of Decryption Techniques in RSA Encryption, With an Implementation in Python." Spring 2021, no. 2 (July 31, 2021): 6–18. http://dx.doi.org/10.48091/gsr.v1i2.18.
Full textChristina C, Merlyne Sandra, Karthika M, Vasanthi M, and Vinotha B. "Video Encryption and Decryption using RSA Algorithm." International Journal of Engineering Trends and Technology 33, no. 7 (2016): 328–32. http://dx.doi.org/10.14445/22315381/ijett-v33p263.
Full textR, Rasu, Manoshrudhy ., and P. Shanmugasundaram. "VLSI Implementation of RSA Encryption/Decryption Algorithm." i-manager's Journal on Computer Science 2, no. 1 (2014): 26–31. http://dx.doi.org/10.26634/jcom.2.1.2848.
Full textSarkar, Santanu, and Subhamoy Maitra. "Cryptanalysis of RSA with two decryption exponents." Information Processing Letters 110, no. 5 (2010): 178–81. http://dx.doi.org/10.1016/j.ipl.2009.11.016.
Full textLi, You Guo. "Improved RSA Algorithm in Hardware Encryption." Applied Mechanics and Materials 543-547 (March 2014): 3610–13. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3610.
Full textSuhandinata, Sebastian, Reyhan Achmad Rizal, Dedy Ongky Wijaya, Prabhu Warren, and Srinjiwi Srinjiwi. "ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 6, no. 1 (2019): 1–10. http://dx.doi.org/10.33330/jurteksi.v6i1.395.
Full textDarari, Radifan, Edi Winarko, and Auli Damayanti. "Encryption and Decryption Application on Images with Hybrid Algorithm Vigenere and RSA." Contemporary Mathematics and Applications (ConMathA) 2, no. 2 (2020): 109. http://dx.doi.org/10.20473/conmatha.v2i2.23855.
Full textSun, Hung-Min, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, and Vincent S. Tseng. "Trading decryption for speeding encryption in Rebalanced-RSA." Journal of Systems and Software 82, no. 9 (2009): 1503–12. http://dx.doi.org/10.1016/j.jss.2009.04.001.
Full textKbarn, Ghassan, and Wathiq Mansoor. "Modified RSA Using Triple Keys Based Encryption/Decryption." Jordan Journal of Electrical Engineering 7, no. 1 (2021): 1. http://dx.doi.org/10.5455/jjee.204-1600376137.
Full textFaiz, Darsanto, Rio Andriyat Krisdiawan, and Dias Eka Prayuda. "IMPLEMENTATION OF THE RSA CRYPTOGRAPHIC ALGORITHM IN THE QR-CODE ANDROID-BASED BUILDING PERMIT CHECKING APPLICATION." NUANSA INFORMATIKA 15, no. 1 (2021): 74. http://dx.doi.org/10.25134/nuansa.v15i1.3895.
Full textPradhan, Sushma, and Birendra Kumar Sharma. "Improved Semantically Secured Variant of RSA Public Key Cryptosystem." International Journal of Informatics and Communication Technology (IJ-ICT) 4, no. 3 (2015): 91. http://dx.doi.org/10.11591/ijict.v4i3.pp91-97.
Full textObaid, Taleb Samad. "Study A Public Key in RSA Algorithm." European Journal of Engineering Research and Science 5, no. 4 (2020): 395–98. http://dx.doi.org/10.24018/ejers.2020.5.4.1843.
Full textFagin, Barry. "Composite Numbers That Give Valid RSA Key Pairs for Any Coprime p." Information 9, no. 9 (2018): 216. http://dx.doi.org/10.3390/info9090216.
Full textDr Asha Ambhaikar, Mr Abhishek Guru,. "AES AND RSA-BASED HYBRID ALGORITHMS FOR MESSAGE ENCRYPTION & DECRYPTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 273–79. http://dx.doi.org/10.17762/itii.v9i1.129.
Full textSarkar, Santanu, and Subhamoy Maitra. "Cryptanalysis of RSA with more than one decryption exponent." Information Processing Letters 110, no. 8-9 (2010): 336–40. http://dx.doi.org/10.1016/j.ipl.2010.02.016.
Full textYousif, Sura F. "ENCRYPTION AND DECRYPTION OF AUDIO SIGNAL BASED ON RSA ALGORITHN." International Journal of Engineering Technologies and Management Research 5, no. 7 (2020): 57–64. http://dx.doi.org/10.29121/ijetmr.v5.i7.2018.259.
Full textLong, Trần Đình. "A VARIANT OF RSA CRYPTOSYSTEM ON THE ENDOMORPHISM RING End(Z_n×Z_(n^k ))." Hue University Journal of Science: Natural Science 127, no. 1A (2018): 101. http://dx.doi.org/10.26459/hueuni-jns.v127i1a.4746.
Full textM. Abd Zaid, Mustafa, and Dr Soukaena Hassan. "Lightweight Rsa Algorithm Using Three Prime Numbers." International Journal of Engineering & Technology 7, no. 4.36 (2018): 293. http://dx.doi.org/10.14419/ijet.v7i4.36.23790.
Full textKovalchuk, Anatoliy, Nataliia Lotoshynska, Mariia Podavalkina, and Khrystyna Pelekh. "RSA ALGORITHM ELEMENTS IN TERNARY AFFINE TRANSFORMATIONS IN ENCRYPTION-DECRYPTION OF IMAGES." Measuring Equipment and Metrology 81, no. 4 (2020): 25–29. http://dx.doi.org/10.23939/istcmtm2020.04.025.
Full textNitaj, Abderrahmane, and Mohamed Ould Douh. "A New Attack on RSA With a Composed Decryption Exponent." International Journal on Cryptography and Information Security 3, no. 4 (2013): 11–21. http://dx.doi.org/10.5121/ijcis.2013.3402.
Full textWu, Tao, ShuGuo Li, and LiTian Liu. "Fast RSA decryption through high-radix scalable Montgomery modular multipliers." Science China Information Sciences 58, no. 6 (2015): 1–16. http://dx.doi.org/10.1007/s11432-014-5215-4.
Full textGinting, Albert, R. Rizal Isnanto, and Ike Pertiwi Windasari. "Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email." Jurnal Teknologi dan Sistem Komputer 3, no. 2 (2015): 253. http://dx.doi.org/10.14710/jtsiskom.3.2.2015.253-258.
Full textLaurentinus, Laurentinus, Harrizki Arie Pradana, Dwi Yuny Sylfania, and Fransiskus Panca Juniawan. "Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm." Jurnal Teknologi dan Sistem Komputer 8, no. 3 (2020): 171–77. http://dx.doi.org/10.14710/jtsiskom.2020.13468.
Full textSafira, Maria Okta, and I. Komang Ari Mogi. "Design Of Hybrid Cryptography With Vigenere Cipher And RSA Algorithm On IOT Data Security." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (2020): 475. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p14.
Full textMochurad, Lesia, Yurii Kryvenchuk, and Svyatoslav Yatsyshyn. "PARALLELIZATION OF RSA CRYPTOGRAPHIC ALGORITHM BASED ON CUDA TECHNOLOGIES." Measuring Equipment and Metrology 82, no. 2 (2021): 5–9. http://dx.doi.org/10.23939/istcmtm2021.02.005.
Full textLee, Sang-Un. "A 2kβ Algorithm for Euler function 𝜙(n) Decryption of RSA". Journal of the Korea Society of Computer and Information 19, № 7 (2014): 71–76. http://dx.doi.org/10.9708/jksci.2014.19.7.071.
Full textAminudin, Aminudin, Gadhing Putra Aditya, and Sofyan Arifianto. "RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol." Jurnal Teknologi dan Sistem Komputer 8, no. 2 (2020): 113–20. http://dx.doi.org/10.14710/jtsiskom.8.2.2020.113-120.
Full textIto, Yasuaki, Koji Nakano, and Bo Song. "The Parallel FDFM Processor Core Approach for CRT-based RSA Decryption." International Journal of Networking and Computing 2, no. 1 (2012): 79–96. http://dx.doi.org/10.15803/ijnc.2.1_79.
Full textArief, S. N., V. A. H. Firdaus, and A. Prasetyo. "Optimization of RSA encryption and decryption process with distributed computing method." IOP Conference Series: Materials Science and Engineering 830 (May 19, 2020): 022090. http://dx.doi.org/10.1088/1757-899x/830/2/022090.
Full textNitaj, Abderrahmane. "A new attack on RSA with two or three decryption exponents." Journal of Applied Mathematics and Computing 42, no. 1-2 (2012): 309–19. http://dx.doi.org/10.1007/s12190-012-0618-0.
Full textDong, Jiankuo, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, and Yuan Zhao. "Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/3508786.
Full textSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Full textWibowo, Nur Cayo Hendro, Khotibul Umam, Albadru Muh Izul Khaq, and Favian Agung Rizki. "Komparasi Waktu Algoritma RSA dengan RSA-CRT Base On Computer." Walisongo Journal of Information Technology 2, no. 1 (2020): 13. http://dx.doi.org/10.21580/wjit.2020.2.1.5402.
Full textSimargolang, Muhammad Yasin. "IMPLEMENTASI KRIPTOGRAFI RSA DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (2017): 1. http://dx.doi.org/10.36294/jurti.v1i1.1.
Full textGulen, Utku, Abdelrahman Alkhodary, and Selcuk Baktir. "Implementing RSA for Wireless Sensor Nodes." Sensors 19, no. 13 (2019): 2864. http://dx.doi.org/10.3390/s19132864.
Full textTahir, Ari Shawkat. "Design and Implementation of RSA Algorithm using FPGA." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 12 (2015): 6361–67. http://dx.doi.org/10.24297/ijct.v14i12.1737.
Full textParihar, Aashish, and Sangeeta Nakhate. "Fast and High-throughput Montgomery Modular Multiplier for RSA Encryption and Decryption." IEIE Transactions on Smart Processing & Computing 7, no. 2 (2018): 148–58. http://dx.doi.org/10.5573/ieiespc.2018.7.2.148.
Full textPing, Luo, and Majid Mumtaz. "An Improved Cryptanalysis of Large RSA Decryption Exponent with constrained Secret key." International Journal of Information and Computer Security 14, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijics.2021.10026019.
Full textZhang, Hanlin, Jia Yu, Chengliang Tian, et al. "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things." IEEE Internet of Things Journal 7, no. 8 (2020): 6868–81. http://dx.doi.org/10.1109/jiot.2020.2970499.
Full textLi, Shi-qun, Yong-dong Wu, Jian-ying Zhou, and Ke-fei Chen. "A practical SSL server performance improvement algorithm based on batch RSA decryption." Journal of Shanghai Jiaotong University (Science) 13, no. 1 (2008): 67–70. http://dx.doi.org/10.1007/s12204-008-0067-y.
Full textMumtaz, Majid, and Luo Ping. "An improved cryptanalysis of large RSA decryption exponent with constrained secret key." International Journal of Information and Computer Security 14, no. 2 (2021): 102. http://dx.doi.org/10.1504/ijics.2021.113168.
Full textMezher, Ahmed Eskander. "Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3949. http://dx.doi.org/10.11591/ijece.v8i5.pp3949-3953.
Full text