Residue Number System Based Fault Tolerant Scheme for Enhancing Rivest Shamir Adleman Encryption Scheme

AM Salifu - 2017 - search.proquest.com
Sensitive information is transmitted across the internet every day and keeping such
information as sacred is an important adventure. This is because malicious activities are on …

[PDF][PDF] Fast Implementation of the Rivest-Shamir-Adleman (RSA) Algorithm with Robust Packet Data Loss Detection Function

I Mubasir, A Abdul-Barik, A Salamudeen - Asian Journal of Engineering …, 2021 - ajeat.com
Encryption is the process of protecting information from unauthorized parties by converting
such information into an unreadable form. Packet data is a method of transferring data …

[PDF][PDF] Rivest Shamir Adleman Encryption Scheme Based on the Chinese Remainder Theorem

S Abdul-Mumin, KA Gbolagade - Advances in Networks, 2018 - academia.edu
Sensitive information is transmitted across the internet every day and keeping such
information as sacred is an important adventure. This is because malicious activities are on …

[PDF][PDF] Kombinasi Metode RSA, Secret Sharingasmuth-Bloom Dan Redundant Pattern Encoding Untuk Mengamankan Pesan

MZ Lubis - Management of Information System Journal, 2022 - journal.fkpt.org
The combination of algorithms is the process of combining more than one algorithm so that
the resulting level of security is better. This study combines 3 direct algorithms so that the …

[PDF][PDF] Comparative study and analysis of cryptographic algorithms AES and RSA

HB Pethe, SR Pande - International Journal of Advance Research in …, 2017 - academia.edu
The use of internet is growing day-by-day. Therefore information security is the major issue
today. To keep our data safe over the internet use of cryptography is important …

Efficient fault-tolerant scheme based on the RSA system

NY Lee, WL Tsai - IEE Proceedings-Computers and Digital Techniques, 2003 - IET
Data security on the Internet is an area of considerable concern. A recently proposed fault-
tolerant scheme for data encryption that was based on the RSA system is shown to be …

Effective Rivest Shamir Adleman Cryptosystem Based on Chinese Remainder Theorem

KY Saheed - 2018 - search.proquest.com
This thesis proposed several schemes for improving the speed and security of Rivest Shamir
Adleman (RSA) cryptosystem. RSA is known to be the most popular and widely used public …

Enriching Information Security via Hybrid of New Expand Rivest Shamir Adleman and Data Encryption Standard Cryptosystem

MB Hammawa, H Bisallah, A Abdulrahman - Journal of Applied Sciences …, 2023 - ajol.info
Cryptography system gives security services ability to protect information from people who
are authorized to use it. This research introduces elevated information security system via …

IMPLEMENTATION OF RSA (RIVEST SHAMIR ADLEMAN) ALGORITHM CRYPTOGRAPHY FOR FILE SECURITY (Case Study: CV. Hardi Junior)

B SERMA BR LIMBONG - 2022 - eprints.uty.ac.id
Digital technology is an information technology that facilitates various human activities
ranging from communication, information, transactions, education, entertainment to even the …

High speed data encryption technique with optimized memory based RSA algorithm for communications

AK Budati, G Snv, K Cherukupalli, AK P, VK Moorthy T - Circuit World, 2021 - emerald.com
Purpose The privacy of the information is a major challenge in the communication process.
In the present modern generation, the cryptography plays a vital role in providing security for …