RSA (cryptosystem)

Known as: RSA (crypto), RSA, Rivest Shamir Adleman 
RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1980-2018
05010015019802018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
This paper proposed enhancing the RSA algorithm through the use of additional third prime number in the composition of the public… (More)
  • figure 1
  • table 3
Is this relevant?
2011
2011
The RSA cryptosystem is most widely used cryptosystem it may be used to provide both secrecy and digital signatures and its… (More)
Is this relevant?
2005
2005
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is the most attractive and… (More)
  • figure 2
  • figure 1
Is this relevant?
2003
2003
We describe an efficient combination of two variants of the RSA cryptosystem (MPrime and Rebalanced RSA) analyzed by Boneh and… (More)
  • table 1
  • table 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Recently Victor Shoup noted that there is a gap in the widely believed security result of OAEP against adaptive chosen-ciphertext… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In this paper, we propose a new algorithm based on Montgomery’s algorithm to calculate modular multiplication that is the core… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Review
1998
Review
1998
Introduction The RSA cryptosystem, invented by Ron Rivest, Adi Shamir, and Len Adleman [18], was first publicized in the August… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
By carefully measuring the amount of time required to perform private key operations, attackers may be able to nd xed Di eHellman… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We present a new proposal for a trapdoor one-way function, from which we derive public-key encryption and digital signatures. The… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
1987
1987
Techniques for a software implementation of the RSA cryptosystem are presented. They allow both space and time requirements of… (More)
Is this relevant?