共 50 条
[21]
Generalized MMM-algorithm secure against SPA, DPA, and RPA
[J].
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007,
2007, 4817
:282-296
[22]
Comparison of ECC and RSA Algorithm with DNA Encoding for IoT Security
[J].
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021),
2021,
:1340-1343
[23]
Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm
[J].
2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI),
2021,
:791-796
[24]
An Efficient Parallel Algorithm for Secured Data Communications Using RSA Public Key Cryptography Method
[J].
SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC),
2014,
:850-854
[25]
Efficient Hardware Implementation of RSA Cryptography
[J].
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION,
2009,
:316-319
[26]
Efficient generation of shared RSA keys
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS,
1997, 1294
:425-439
[28]
Implementation of the RSA Algorithm on a DataFlow Architecture
[J].
IPSI BGD TRANSACTIONS ON INTERNET RESEARCH,
2013, 9 (02)
:11-16
[29]
An Improved Exponentiation Algorithm for RSA Cryptosystem
[J].
2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009,
2009,
:128-+
[30]
Key Generation Algorithm Design Combination of RSA and ElGamal Algorithm
[J].
PROCEEDINGS OF 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE),
2016,