Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication

K Assa-Agyei, T Al-Hadhrami… - International …, 2024 - westminsterresearch.westminster.ac …
Email serves as the primary communication system in our daily lives, and to bolster its
security and efficiency, many email systems employ Public Key Infrastructure (PKI) …

Proposed Enhance Authentication by Development of El Gamal Subliminal Channel

SB Sadkhan - 2019 2nd Scientific Conference of Computer …, 2019 - ieeexplore.ieee.org
The subliminal channels are covert channels that can be used to communicate secretly in a
normal looking communication over an insecure channel. This channel in a cryptographic …

Análisis de la firma digital con base en la infraestructura de clave pública

FYH García - Hamut´ ay, 2018 - dialnet.unirioja.es
El análisis descriptivo del funcionamiento de la arquitectura de firma digital con base en
infraestructura de clave pública determinó el objetivo central de toda la investigación, por …

Cryptanalytic attacks on RSA algorithm and its variants.

D Savić, P Milić, B MAŻINJANIN… - Przeglad …, 2022 - search.ebscohost.com
The goal of this paper is to provide a review of principles and techniques used in public-key
cryptanalysis with special attention on RSA algorithm. The ways to defend against attacks on …

Enhancing the performance of cryptographic algorithms for secured data transmission

K Assa-Agyei - 2024 - irep.ntu.ac.uk
Cryptography is crucial in the digital age for protecting data integrity, verifying users and
entities, and maintaining the secrecy of sensitive information. This is accomplished by …

Encrypted and secure messages with CAN FD

A Acosta Montilla - 2021 - upcommons.upc.edu
The project intends to portray an approach to design a cryptographic secured way to
transmit messages on the well-known CAN bus communication protocol in modern cars …

[PDF][PDF] Análisis de la firma digital con base en la infraestructura de clave

FYH García - scholar.archive.org
El análisis descriptivo del funcionamiento de la arquitectura de firma digital con base en
infraestructura de clave pública determinó el objetivo central de toda la investigación, por …

[引用][C] Key Exchange Protocol Based on MPF and Circulant Matrix over Tropical Algebras

M Ayoub - 2021 - MS Thesis. Capital University of …

[引用][C] Cryptographic schemes based on enhanced matrix power function

S Noor - 2019 - Capital University Bexley, OH, USA

[引用][C] Student privacy preserving framework based on blockchain technology

S Noureen - 2019 - CAPITAL UNIVERSITY