• Nenhum resultado encontrado

[PDF] Top 20 ENHANCING THE SECURITY OF THE RSA CRYPTOSYSTEM

Has 10000 "ENHANCING THE SECURITY OF THE RSA CRYPTOSYSTEM" found on our website. Below are the top 20 most common "ENHANCING THE SECURITY OF THE RSA CRYPTOSYSTEM".

ENHANCING THE SECURITY OF THE RSA CRYPTOSYSTEM

ENHANCING THE SECURITY OF THE RSA CRYPTOSYSTEM

... described the first practical adaptive chosen ciphertext attack, against RSA-encrypted messages using the PKCS #1 v1 [15] padding scheme (a padding scheme randomizes and adds structure to an ... See full document

8

An Efficient Framework For Enhancing Security In The Cloud Environment

An Efficient Framework For Enhancing Security In The Cloud Environment

... overview of the User Accountability framework and discuss how the framework provides enhanced ...for enhancing the security in the cloud environment. The framework ... See full document

5

EFFICIENT ASIC ARCHITECTURE OF RSA CRYPTOSYSTEM

EFFICIENT ASIC ARCHITECTURE OF RSA CRYPTOSYSTEM

... design of the RSA cryptosystem i.e. RSA crypto- accelerator along with key-pair ...for the same is proposed and implemented. The purpose is to design a complete ... See full document

15

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

... are the best cover media to hide messages. Digital images are the most widespread cover files used for SG, due to their high embedding efficiency and the insensitivity of the human ... See full document

6

Mathematical Attacks on RSA Cryptosystem

Mathematical Attacks on RSA Cryptosystem

... track of how long a computer takes to decipher ...then the value m is not modified. However, if d[i]=1, then we multiply the previous result by C 2*i .... The Timing attack uses the ... See full document

7

Data Security With Colors Using Rsa

Data Security With Colors Using Rsa

... gives the darkest color (no light, considered the black), and full intensity of each gives a white; the quality of this white depends on the nature of the primary ... See full document

5

Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

... ABSTRACT: Security is required to transmit confidential information over the ...network. Security is also demanding in wide range of ...providing the data security against ... See full document

7

Assessment Of Some Acceleration Schemes In The Solution Of Systems Of Linear Equations.

Assessment Of Some Acceleration Schemes In The Solution Of Systems Of Linear Equations.

... SOR. The iterative schemes were applied to Banded system, Tridiagonal systems and SPD system with varying ...dimensions. The Krylov subspace methods: GMRES, QMR, MINRES and BiCGSTAB converged to an ... See full document

8

The analysis of solidification process of ferritic-austenitic cast steel

The analysis of solidification process of ferritic-austenitic cast steel

... during the last stage of solidification, proceeding in fact under the non-equilibrium ...conditions. The negative influence of the effects of the peritectic ... See full document

4

General Considerations about Matrimonial Regime under the Provisions of the New Romanian Civil Code

General Considerations about Matrimonial Regime under the Provisions of the New Romanian Civil Code

... In the past 50 years Romanian experts have equated the notion of property relations between spouses with the notion of matrimonial ...regime. The Romanian contemporary doctrine ... See full document

24

Determinants and Consequences of   the Website Perceived Value

Determinants and Consequences of the Website Perceived Value

... in the 1990s as an issue of growing interest to business, in particular to marketing at both academic and practitioner ...one of the most significant factors in the success of an ... See full document

13

Winning the Oil Lottery: The Impact of Natural Resource Extraction on Growth Tiago Cavalcanti Daniel Da Mata Frederik Toscani

Winning the Oil Lottery: The Impact of Natural Resource Extraction on Growth Tiago Cavalcanti Daniel Da Mata Frederik Toscani

... studied the effects of oil discoveries on the local development of only one ...instance, the U.S. has a more widespread ownership of resources than ...thousands of oil ... See full document

50

The Effects of Gender Segregation at the Occupation, Industry, Establishment, and Job-Cell Levels on the Male-Female Wage Gap

The Effects of Gender Segregation at the Occupation, Industry, Establishment, and Job-Cell Levels on the Male-Female Wage Gap

... part of the wage gap is attributable to human capital differences between the genders, the process of allocation of males and females in the labor market leads to a type ... See full document

23

The oolitization rate determination of bentonite moulding mixtures

The oolitization rate determination of bentonite moulding mixtures

... from the fact that the silica grain and the oolitized layer on the grain surface have a different specific weight, .... The sample makes use of opening material modification ... See full document

4

Evaluation of susceptibility of the ZRE1 alloy to hot cracking in conditions of forced strain

Evaluation of susceptibility of the ZRE1 alloy to hot cracking in conditions of forced strain

... for the alloy was determined by testing cylindrical Ø 6 x 90 mm specimens on the Gleeble 3800 ...to the specimens, and then the specimens were fixed in the chamber by means of ... See full document

6

Prostate Cancer: A State of The Heart

Prostate Cancer: A State of The Heart

... with the case of a 57-year-old male diagnosed with a 4 + 3 bilateral extended prostate ...cancer. The patient displayed some CV risk factors, including diabetes and ...staging, the patient ... See full document

6

Modeling of Two-Stage Solidification: Part II Computational Verification of the Model

Modeling of Two-Stage Solidification: Part II Computational Verification of the Model

... mentioned, the first stage is identical for both eutectic transformation ...When the temperature drops below liquidus temperature, dendritic grains nucleate and ...layers of neighboring grains ... See full document

6

Analytical Determining Of The Steinmetz Equivalent Diagram Elements Of Single-Phase Transformer

Analytical Determining Of The Steinmetz Equivalent Diagram Elements Of Single-Phase Transformer

... teacher of electrical engineering to his students on the various levels, was given like ...to the equivalent diagram elements of single-phase transformer current, particularly to those ... See full document

8

Buying Behavior Of Organic Vegetables Product The Effects Of Perceptions Of Quality And Risk

Buying Behavior Of Organic Vegetables Product The Effects Of Perceptions Of Quality And Risk

... intentions of organic products from the customers in view of the importance of health on environmental issues (Saleki et ...by the community. However, there needs to be studied ... See full document

8

Distributions of grain parameters on the surface of aircraft engine turbine blades

Distributions of grain parameters on the surface of aircraft engine turbine blades

... in the grain size, which is reflected in the quantitative ...analysis. The grain area distributions in the projection plane ...and of the grains with a non-planar surface (Fig. ... See full document

6

Show all 10000 documents...