Rivest-Shamir-Adleman (RSA)
| Main Authors: | Mohammed Hayek, Iqram, Alshaikhli, Imad Fakhri Taha, Mahmood Al Dabbagh, Sufyan Salim, Abu Hilal, Kusai |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20642/ http://irep.iium.edu.my/20642/1/C13_-_Rivest-Shamir.pdf |
Similar Items
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014)
by: Abubakar, Adamu, et al.
Published: (2014)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
On the insecurity of generalized (Rivest-Shamir-Adleman) - advance and adaptable cryptosystem
by: Isa, M.A.M., et al.
Published: (2019)
by: Isa, M.A.M., et al.
Published: (2019)
Shamir’s threshold scheme
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
by: Paniandi, Arul
Published: (2006)
by: Paniandi, Arul
Published: (2006)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
Digital signature algorithm
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Feige-Fiat-Shamir identification scheme
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Introduction
by: Israfil, Muhammad, et al.
Published: (2011)
by: Israfil, Muhammad, et al.
Published: (2011)
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2016)
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2016)
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Introduction
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
Message Digest (MDx) family
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
RIPEMD and Chameleon hash function
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
Improving the cost factor of DLBCA lightweight block cipher algorithm
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018)
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018)
The influence of Internet and social media on purchasing
decisions in Indonesia and a comparison between
Indonesia and Kuwait
by: al-enizi, Khalid, et al.
Published: (2019)
by: al-enizi, Khalid, et al.
Published: (2019)
Kriptosistem Multi-Rsa
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
Modified multi prime RSA cryptosystem
by: Kamardan, M. Ghazali, et al.
Published: (2018)
by: Kamardan, M. Ghazali, et al.
Published: (2018)
An improved full search block matching algorithm for imaging applications
by: AlDabbagh, S.S.M., et al.
Published: (2012)
by: AlDabbagh, S.S.M., et al.
Published: (2012)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
Security of present s-box
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
Similar Items
-
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014) -
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
On the insecurity of generalized (Rivest-Shamir-Adleman) - advance and adaptable cryptosystem
by: Isa, M.A.M., et al.
Published: (2019) -
Shamir’s threshold scheme
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
by: Paniandi, Arul
Published: (2006)