[PDF][PDF] Data encryption and decryption using RSA algorithm in a network environment

NY Goshwe - International Journal of Computer Science and …, 2013 - academia.edu
One of the principal challenges of resource sharing on data communication network is its
security. This is premised on the fact that once there is connectivity between computers …

Acceleration of RSA processes based on hybrid ARM-FPGA cluster

X Bai, L Jiang, Q Dai, J Yang… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Cooperation of software and hardware with hybrid architectures, such as Xilinx Zynq SoC
combining ARM CPU and FPGA fabric, is a high-performance and low-power platform for …

[PDF][PDF] Data integrity checking based on residue number system and Chinese remainder theorem in cloud

V Hema, MG Durga - International Journal of Innovative Research in …, 2014 - Citeseer
Remote data integrity checking is a decisive technology in cloud computing. Recently, many
researchers focus on providing data dynamics and public verifiability. To address users' …

A hybrid approach for encrypting data on cloud to prevent DoS attacks

N Singh, PD Kaur - International Journal of Database Theory and …, 2015 - earticle.net
Any technology cannot be said perfect until it is free from any vulnerability. So whenever a
new technology is introduced the security is the first feature that is countable. There are …

Secure File Storage in Cloud Computing Using a Modified Cryptography Algorithm

M Smriti, SV Venkatraman, A Raj… - … Smarter and More …, 2022 - igi-global.com
This chapter investigates the security issues identified with the file cloud storage to ensure
the security of client information in cloud information server. The authors have proposed a …

A residue number system based data hiding using steganography and cryptography

JB Eseyin, KA Gbolagade - NIU Journal of Social Sciences, 2019 - ijhumas.com
Cryptography and Steganography are two distinct approaches for protected data hiding and
diffusion that are widely obtainable. One hides the presence of the message and the other …

Speed up RSA's Decryption Process with Large sub Exponents using Improved CRT

K Somsuk, T Chiawchanwattana… - 2018 International …, 2018 - ieeexplore.ieee.org
The aim of this paper is to present the improvement of Chinese Remainder Theorem (CRT)
to speed up RSA's decryption process by changing sub exponents and transforming …

[PDF][PDF] Acceleration of the RSA Processes based on Parallel Decomposition and Chinese RemainderTheorem

MI Younis, HM Fadhil, ZN Jawad - International Journal of …, 2016 - academia.edu
Within current advancement in computer architecture, the trends nowadays involve re-
design and re-implement of algorithms to take the advantages of currently available …

[PDF][PDF] Study of Multi-Prime RSA

S Kaur, S Mankotia, P Bharadwaj - Fusion: Practice and …, 2020 - researchgate.net
This paper studies and analyses the encryption and decryption times of a popular variant of
the RSA algorithm, the multi-prime RSA. This algorithm uses more than two prime numbers …

A vehicle-to-infrastructure communication privacy protocolused Blockchain

S Harrabi, IB Jaafar, O Omrani - 2024 - researchsquare.com
Since several decade, the Internet of Things IoT hasattracted enormous interest in the
research communityand industry. However, IoT technologies has completelytransformed …