Zobrazeno 1 - 10
of 305
pro vyhledávání: '"Asymmetric cryptography"'
Autor:
Wan Nur Aqlili Ruzai, You Ying, Khairun Nisak Muhammad, Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin
Publikováno v:
AIMS Mathematics, Vol 9, Iss 10, Pp 28211-28231 (2024)
The Rivest-Shamir-Adleman (RSA) algorithm is a widely utilized technique in asymmetric cryptography, primarily for verifying digital signatures and encrypting messages. Its security relies on the integer factorization problem's difficulty, which is c
Externí odkaz:
https://doaj.org/article/8630e31f86044eba94a795c9ca0b4a65
Autor:
Bhanu Priyanka Valluri, Nitin Sharma
Publikováno v:
Measurement: Sensors, Vol 33, Iss , Pp 101150- (2024)
Wireless Sensor Networks (WSNs) are networks of low-power, low-cost devices that may gather data for many applications. These networks rely heavily on Medium Access Control (MAC) features for administration due to the critical roles of energy and sec
Externí odkaz:
https://doaj.org/article/257a8cff5b024040805e437c8d9fa438
Publikováno v:
Vojnotehnički Glasnik, Vol 71, Iss 4, Pp 996-1027 (2023)
Introduction/purpose: Advances in information and communication technologies have enabled the creation of a symbiotic environment of humans and machines in which humans interact with machines to get better quality of everyday life. In that interactio
Externí odkaz:
https://doaj.org/article/e3f690edd80541e48404527ee4987b12
Publikováno v:
Lietuvos Matematikos Rinkinys, Vol 64, Iss A (2023)
In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. To improve the performance of the modified attack we introduce additional parameters.
Externí odkaz:
https://doaj.org/article/588a2d536e3147f9918a69a77fb2e771
Publikováno v:
IEEE Access, Vol 11, Pp 141926-141955 (2023)
Blockchain has shifted the paradigm of computer-based commercial applications during the last decade. Initially developed as a public ledger for Bitcoin transactions, it has already shown that it has the potential to revolutionize the world, where tr
Externí odkaz:
https://doaj.org/article/7bbd3e84b74641d58c83b2dcda30075f
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 32, Iss 1, Pp 139-146 (2022)
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards. In addition to the extraordinary effects on society, the pandemic created a range of unique circ
Externí odkaz:
https://doaj.org/article/87febadb5d254f04ab72b8995280403b
Autor:
Andrii Tereshchenko, Valeriy Zadiraka
Publikováno v:
Кібернетика та комп'ютерні технології, Iss 4, Pp 61-79 (2021)
Introduction. The emergence of new parallel computing systems such as multi-core processors, clusters, distributed systems, due to the solution of various applications in different spheres. Among such problems are the calculation of systems of linear
Externí odkaz:
https://doaj.org/article/a89a5074cc2b42fda85a59fac02e425c
Publikováno v:
Future Internet, Vol 15, Iss 8, p 262 (2023)
Technology advancements have driven a boost in electronic commerce use in the present day due to an increase in demand processes, regardless of whether goods, products, services, or payments are being bought or sold. Various goods are purchased and s
Externí odkaz:
https://doaj.org/article/38da8a20fc254321a0d8c5e6764530b9
Autor:
К. Лесогорський, Е. Жаріков
Publikováno v:
Adaptivni Sistemi Avtomatičnogo Upravlinnâ, Vol 1, Iss 40 (2022)
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema
Externí odkaz:
https://doaj.org/article/45086a6da68a4b42af75d04aaddbe316
Autor:
Md Nizam Udin, Farah Azaliney Mohd Amin, Aminah Abdul Malek, Nur Annisa Zulkifili, Nur Atiqah Ghazali, Siti Aisyah Mohd Ridzuwan
Publikováno v:
Malaysian Journal of Computing, Vol 6, Iss 2, Pp 812-822 (2021)
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finit
Externí odkaz:
https://doaj.org/article/cca26b18d7af4a98a367df13abc5c281