Systematic and critical review of rsa based public key cryptographic schemes: Past and present status

R Imam, QM Areeb, A Alturki, F Anwer - IEEE Access, 2021 - ieeexplore.ieee.org
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …

Joint Relay and Eavesdropper Selection Strategy Against Multiple Eavesdroppers over Nakagami- Fading Channels in Cooperative Decode-and-Forward Relay …

Q Guo, W Feng - IEEE Access, 2019 - ieeexplore.ieee.org
Physical layer security (PLS) in the presence of multiple eavesdroppers over Nakagami-
fading channels for cooperative decode-and-forward (DF) relay network that consists of one …

Preserving Confidentiality against Factorization Attacks using Fake Modulus () Approach in RSA and its Security Analysis

BR Puneeth, KR Raghunandan… - 2022 IEEE 9th Uttar …, 2022 - ieeexplore.ieee.org
In today's world, the most vital feature is the security of shared information. To achieve this,
various algorithms are offered in cryptosystems, with RSA being one among them. RSA is a …

RSA‐Based Encryption Approach for Preserving Confidentiality Against Factorization Attacks

KR Raghunandan - Modeling and Optimization of Optical …, 2023 - Wiley Online Library
Security of the shared information is the most important aspect in today's life. Various
algorithms are proposed in cryptosystem to achieve the same and RSA is one of them …

Hybrid Cryptosystems MRC-4 Algorithm and RSA Dual Modulus to Secure Data

B Hutagaol, MA Budiman… - … Conference of Computer …, 2023 - ieeexplore.ieee.org
Cryptography is very important when we talk about the security of data. Cryptography is a
science that studies techniques, both mathematical and intuitive, related to aspects of data …

[PDF][PDF] Nakagami-m 衰落信道下存在窃听攻击的认知中继网络安全性与可靠性折中方案

王兴鹏, 许晓荣, 胡安迪, 冯维 - 电信科学, 2018 - infocomm-journal.com
研究了由源节点, 目的节点和多个中继节点组成的认知解码转发(DF) 中继网络中物理层安全与
可靠性折中方案. 该方案以保障最大安全主链路信道容量为目标, 提出了存在窃听攻击情况下的 …

Enhanced RSA Cryptosystem: A Secure and Nimble Approach

T Gandhi, M Navlakha, R Raheja… - … on Advances in …, 2022 - ieeexplore.ieee.org
With the rise in Internet and Network applications in the last decade, there is a need for
making communication over the internet to be more secure and strong in order to avoid …

[PDF][PDF] Selective Multi Keys to Modify RSA Algorithm

MB Abdulrazzaq - Journal of Zankoy Sulaimani-Part A, 2019 - researchgate.net
The use of the internet and communication technology noticeably contributes to
development in all branches of science. The data that is transferred to communication …

[PDF][PDF] A Novel Hybrid Security Algorithm

M Kumari, D Ekka, N Yadav - i-Manager's Journal on …, 2018 - imanagerpublications.com
ABSTRACT A New Novel Hybrid Security Algorithm (NHSA) for Rivest-Shamir-Adleman
(RSA) cryptosystem was proposed in this paper, which is based on Encryption algorithm …