• Nenhum resultado encontrado

[PDF] Top 20 Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

Has 10000 "Improved RSA cryptosystem based on the study of number theory and public key cryptosystems" found on our website. Below are the top 20 most common "Improved RSA cryptosystem based on the study of number theory and public key cryptosystems".

Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

... providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key ...asymmetric key cryptography, also ... See full document

7

Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library

Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library

... Protection of data is the utmost thing for any company related to digital ...adapted, based on the priority of demand of that piece of ...several ... See full document

5

A New Factorization Method to Factorize RSA Public Key Encryption

A New Factorization Method to Factorize RSA Public Key Encryption

... Public key cryptography is one of the mathematical applications that are valuable in sending information via insecure ...channel. RSA algorithm is a public key encryption ... See full document

6

Development of a New Elliptic Curve Cryptosystem with Factoring Problem

Development of a New Elliptic Curve Cryptosystem with Factoring Problem

... statement: The security of elliptic curve cryptosystems are based on elliptic curve discrete logarithm problem ...ECDLP, the elliptic curve-based systems will no longer be ... See full document

5

Add-On Security Model for Public-Key Cryptosystem Based on Magic Square Implementation

Add-On Security Model for Public-Key Cryptosystem Based on Magic Square Implementation

... is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin ...into ... See full document

5

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

... 2 the problem of solving nonlinear system of equations over finite fields which is proven to be ...advantage on solving NP-complete problems, so multivariate cryptography can be a viable ... See full document

10

BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra

BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra

... With the rapid development of wireless communication system widely deployed in recent years, security has become a crucial ...meet the requirements of data and network communication ... See full document

6

Lat. Am. j. solids struct.  vol.10 número2

Lat. Am. j. solids struct. vol.10 número2

... discovery of the piezoelectric effect goes back to the beginning of the nineteenth ...until the First World War. Piezoelectric material comprises one of the main ... See full document

24

The Influence of Small Amounts of Aluminium on the Spheroidization of Cast Iron with Cerium Mischmetal

The Influence of Small Amounts of Aluminium on the Spheroidization of Cast Iron with Cerium Mischmetal

... influence of aluminium (added in quantity from about 0.6% to about 2.8%) on both the alloy matrix and the shape of graphite precipitates in cast iron treated with a fixed amounts ... See full document

6

Lat. Am. j. solids struct.  vol.14 número4

Lat. Am. j. solids struct. vol.14 número4

... 27. The mathematical formulation used Hamilton’s principle to derive the equations of motion and boundary conditions, and then used Fourier series to solve ...verify the accuracy ... See full document

29

Ateneu Comercial de Lisboa: restructuring a public artery

Ateneu Comercial de Lisboa: restructuring a public artery

... exclusively on issues related to the manipulation of light, emphasizing an expansion of the visual perception of the ...Each of his installations active sen- sory ... See full document

99

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

... at the point of entry of any country we are ...affects the accuracy and efficiency of processing the ...Work on e- visa is almost unexplored. Approach: This ... See full document

5

Lagrange interpolation based Asymmetric Group Key Agreement Cryptosystem

Lagrange interpolation based Asymmetric Group Key Agreement Cryptosystem

... From the figure, we can observe that, in proposed technique, the time required for generation of encrypted key linearly increases with the increase in group ...two key generation ... See full document

12

The comparison of the structure and microhardness of the tool steel C90 and HS 6-5-2 remelted with the electric arc

The comparison of the structure and microhardness of the tool steel C90 and HS 6-5-2 remelted with the electric arc

... remelted on the surface with the electric arc with the use of the FALTIG 315AC/DC ...apparatus. The single remelting was applied. The treatment parameters were ... See full document

4

Business model innovation in chinese private art galleries: a dual value proposition model

Business model innovation in chinese private art galleries: a dual value proposition model

... exploration of business models of enterprises can be regarded as an eternal and new ...topic. The exploration of business models involves such aspects as model factors, innovative ... See full document

151

The Effects of Gender Segregation at the Occupation, Industry, Establishment, and Job-Cell Levels on the Male-Female Wage Gap

The Effects of Gender Segregation at the Occupation, Industry, Establishment, and Job-Cell Levels on the Male-Female Wage Gap

... rely on a large panel of matched employer- employee data. Based on administrative files maintained by the federal government in Brazil (Rela¸c˜ao Anual de Informa¸c˜oes Sociais - RAIS ... See full document

23

Elliott's Wave theory in the field of econophysics and its application to the PSI20 in the context of crisis

Elliott's Wave theory in the field of econophysics and its application to the PSI20 in the context of crisis

... system of rules derived empirically to interpret the action of the main movements of the stock ...using the Elliott Wave patterns is quite ...identify the main wave ... See full document

13

Measuring the Social Recreation Per-Day Net Benefit of Wildlife Amenities of a National Park: A Count-Data Travel Cost Approach

Measuring the Social Recreation Per-Day Net Benefit of Wildlife Amenities of a National Park: A Count-Data Travel Cost Approach

... euros of travel and on-site stay time per visitor per day 9 respectively, quantified in costs in euros per each hour expended during the trip and the ...stay. The cost in ... See full document

40

Motivational patterns in persistent swimmers: A serial mediation analysis

Motivational patterns in persistent swimmers: A serial mediation analysis

... assumptions, the Motivational Model of the Coach-Athlete Relationship (MMCAR: Mageau & Vallerand, 2003) was developed to better understand the determinants and consequences ... See full document

13

RSA Based Key Compromised Resistant Protocol(KCR) For Large Databases

RSA Based Key Compromised Resistant Protocol(KCR) For Large Databases

... assistants, and p patients. So, the groups are dentist, dentist assistant and patient, and the total number of clients is d+a+p in which each one of the ... See full document

6

Show all 10000 documents...