Systematic and critical review of rsa based public key cryptographic schemes: Past and present status

R Imam, QM Areeb, A Alturki, F Anwer - IEEE access, 2021 - ieeexplore.ieee.org
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …

A novel image encryption technique using Arnold transform and asymmetric RSA algorithm

GK Soni, H Arora, B Jain - … and Applications 2019: Proceedings of ICAIAA …, 2020 - Springer
Today, people all over the world want to exchange information, but they are concerned
about security aspects while sharing information. The encryption and decryption are the one …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

RSA and Elliptic Curve Encryption System: A Systematic Literature Review

M Ugbedeojo, MO Adebiyi, OJ Aroba… - International Journal of …, 2024 - igi-global.com
Almost every living species has a motive to communicate electronically with one another
and preserve data for immediate or future use. These data are becoming too large to be …

Chua's Oscillator Based RSA Algorithm With Authenticated Masked Public Key for Secure Communication

N Sharma, P Kumar, SK Rai - IEEE Transactions on Consumer …, 2023 - ieeexplore.ieee.org
This article proposes Chua's oscillator-based RSA algorithm for secure communication. The
prime numbers, required in the RSA algorithm, are generated with the help of different …

TD2SecIoT: temporal, data-driven and dynamic network layer based security architecture for industrial IoT

D Dejene, B Tiwari, V Tiwari - IJIMAI, 2020 - dialnet.unirioja.es
Resumen The Internet of Things (IoT) is an emerging technology, which comprises wireless
smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart …

Research trends review on RSA scheme of asymmetric cryptography techniques

MSA Mohamad, R Din, JI Ahmad - Bulletin of Electrical Engineering and …, 2021 - beei.org
One of the cryptography classifications is asymmetric cryptography, which uses two different
keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of …

An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA

C Zhang, Y Liang, A Tavares, L Wang, T Gomes… - Symmetry, 2024 - mdpi.com
Due to its very desirable properties, Chebyshev polynomials are often used in the design of
public key cryptographic systems. This paper discretizes the Chebyshev mapping …

An enhanced RSA algorithm using Gaussian interpolation formula

JK Dawson, F Twum… - … of Computer Aided …, 2022 - inderscienceonline.com
Data security is a crucial concern that ought to be managed to help protect vital data.
Cryptography is one of the conventional approaches for securing data and is generally …

Preserving Confidentiality against Factorization Attacks using Fake Modulus () Approach in RSA and its Security Analysis

BR Puneeth, KR Raghunandan… - 2022 IEEE 9th Uttar …, 2022 - ieeexplore.ieee.org
In today's world, the most vital feature is the security of shared information. To achieve this,
various algorithms are offered in cryptosystems, with RSA being one among them. RSA is a …