Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,184,859 papers from all fields of science
Search
Sign In
Create Free Account
RSA (cryptosystem)
Known as:
RSA (crypto)
, RSA
, Rivest Shamir Adleman
Expand
RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Alice and Bob
Atmospheric noise
Blinding (cryptography)
Chosen-ciphertext attack
Expand
Broader (1)
E-commerce
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Picosecond and femtosecond optical nonlinearities of novel corroles
S. Hamad
,
S. P. Tewari
,
L. Giribabu
,
Venugopal Rao Soma
2012
Corpus ID: 51943338
We present our results from the experimental and modeling studies of picosecond (ps) and femtosecond (fs) nonlinearities of two…
Expand
2012
2012
An Implementation of RSA Algorithm in Google Cloud using Cloud SQL
N. Saravanan
,
A. Mahendiran
,
N. Subramanian
,
N. Sairam
2012
Corpus ID: 18522702
Aim of this study is to protect the data stored on cloud by using security algorithm. Cloud computing model advances many web…
Expand
Highly Cited
2011
Highly Cited
2011
Routing and spectrum assignment algorithm maximizes spectrum utilization in optical networks
Y. Sone
,
A. Hirano
,
A. Kadohata
,
M. Jinno
,
O. Ishida
37th European Conference and Exhibition on…
2011
Corpus ID: 13460998
This paper proposes a routing and spectrum assignment algorithm for elastic optical networks. The algorithm achieves high…
Expand
Highly Cited
2011
Highly Cited
2011
New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
Neeraj Khanna
,
J. Nath
,
Joel James
,
Sayantan Chakraborty
,
A. Chakrabarti
,
A. Nath
International Conference on Communication Systems…
2011
Corpus ID: 45219711
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors…
Expand
Highly Cited
2010
Highly Cited
2010
A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication
Wuling Ren
,
Zhiqian Miao
Second International Conference on Modeling…
2010
Corpus ID: 7576364
To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is…
Expand
Highly Cited
2009
Highly Cited
2009
Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks
Xuefei Cao
,
Xing Zeng
,
W. Kou
,
Liang Hu
IEEE Transactions on Vehicular Technology
2009
Corpus ID: 13509967
Based on identity-based cryptography, this paper proposes a remote authentication protocol featured with client anonymity…
Expand
Highly Cited
2007
Highly Cited
2007
A Direct Anonymous Attestation Scheme for Embedded Devices
H. Ge
,
S. Tate
International Conference on Theory and Practice…
2007
Corpus ID: 15100983
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its…
Expand
2006
2006
Mathematical Attacks on RSA Cryptosystem
Imad Salah
,
Abdullah Darwish
,
S. Oqeili
2006
Corpus ID: 17783133
In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe…
Expand
2005
2005
An efficient decryption method for RSA cryptosystem
Ren-Junn Hwang
,
Feng-Fu Su
,
Y. Yeh
,
Chia-Yao Chen
19th International Conference on Advanced…
2005
Corpus ID: 18941050
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is the most attractive and…
Expand
Highly Cited
1997
Highly Cited
1997
VLSI array algorithms and architectures for RSA modular multiplication
Y. Jeong
,
W. Burleson
IEEE Transactions on Very Large Scale Integration…
1997
Corpus ID: 36721067
We present two novel iterative algorithms and their array structures for integer modular multiplication. The algorithms are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE