Enhancement of RSA Key Generation Using Identity
The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. This algorithm used user’s identity to replace the numbers that are used...
| Main Authors: | Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer International Publishing
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/6136/ http://umpir.ump.edu.my/id/eprint/6136/1/Enhancement%20of%20RSA%20Key%20Generation%20Using%20Identity.pdf |
Similar Items
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012)
by: Norhidayah, Muhammad, et al.
Published: (2012)
Improve Knowledge Visualization through an Interactive Graph-based Dashboard System with Key Performance Indicator: A Case Study of University Dashboard for Higher Education
by: Wan Maseri, Wan Mohamad, et al.
Published: (2007)
by: Wan Maseri, Wan Mohamad, et al.
Published: (2007)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Key LogiQL Concepts
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Database Integration via Mediator Approach for Integrated Applications with NFC Technology
by: Mohd Kamir, Yusof, et al.
Published: (2014)
by: Mohd Kamir, Yusof, et al.
Published: (2014)
RSA algorithm performance in short messaging system exchange environment
by: Mohamad Tahir, Hatim, et al.
Published: (2011)
by: Mohamad Tahir, Hatim, et al.
Published: (2011)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
by: Shereek, Balkees Mohamed
Published: (2016)
by: Shereek, Balkees Mohamed
Published: (2016)
An analysis of a private-key cryptosystem / by Tan Wei-Wey.
by: Tan, Wei-Wey
Published: (2002)
by: Tan, Wei-Wey
Published: (2002)
Designing a Chatbot for diabetic patients
by: Jasni, Mohamad Zain, et al.
Published: (2009)
by: Jasni, Mohamad Zain, et al.
Published: (2009)
Partial key attack given MSBs of CRT-RSA private keys
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
An enhanced tree-based key management scheme for secure communication in wireless sensor network
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
Hybrid Neural Network and Decision Tree for for Exchange Rates Forecasting
by: Ardiansyah, Soleh, et al.
Published: (2012)
by: Ardiansyah, Soleh, et al.
Published: (2012)
Foreign Exchange Forecasting by using Artificial Neural Networks: A Survey of Literature
by: Ardiansyah, Soleh, et al.
Published: (2012)
by: Ardiansyah, Soleh, et al.
Published: (2012)
Applying Artificial Neural Networks in Forecasting US Dollars-Indonesian Rupiah Exchange
by: Ardiansyah, Soleh, et al.
Published: (2013)
by: Ardiansyah, Soleh, et al.
Published: (2013)
The Use of Artificial Neural Network for Forecasting of FTSE Bursa Malaysia KLCI Stock Price Index
by: Ardiansyah, Soleh, et al.
Published: (2013)
by: Ardiansyah, Soleh, et al.
Published: (2013)
Knowledge of extraction from trained neural network by using decision tree
by: Soleh, Ardiansyah, et al.
Published: (2017)
by: Soleh, Ardiansyah, et al.
Published: (2017)
Fast Public-Key Cryptosystems: Design And Cryptanalyses
by: Go, Bok Min
Published: (2006)
by: Go, Bok Min
Published: (2006)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
by: Hongwu, Qin, et al.
Published: (2014)
by: Hongwu, Qin, et al.
Published: (2014)
Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images
by: Hui, Liang Khor, et al.
Published: (2017)
by: Hui, Liang Khor, et al.
Published: (2017)
Reversible Watermarking Based on Sorting Prediction Algorithm
by: Khalid, Edris, et al.
Published: (2015)
by: Khalid, Edris, et al.
Published: (2015)
Data Mining for Education Decision Support: A Review
by: Suhirman, Suhirman, et al.
Published: (2014)
by: Suhirman, Suhirman, et al.
Published: (2014)
XRecursive: An efficient method to store and query XML documents
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
Fabric authenticity method using fast Fourier transformation detection
by: Norislina, Ismail, et al.
Published: (2011)
by: Norislina, Ismail, et al.
Published: (2011)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
RSA with flexible key size: a hardware approach
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
Managing educational resource-student information systems using BVAGQ fragmented database replication model
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
Clinical assessment of watermarked medical images
by: Mohamad Zain, Jasni, et al.
Published: (2009)
by: Mohamad Zain, Jasni, et al.
Published: (2009)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
Malaysian Sign Language Recognition Using Skeleton Data with Neural Network
by: Sutarman, na, et al.
Published: (2015)
by: Sutarman, na, et al.
Published: (2015)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Similar Items
-
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013) -
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015) -
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012) -
Improve Knowledge Visualization through an Interactive Graph-based Dashboard System with Key Performance Indicator: A Case Study of University Dashboard for Higher Education
by: Wan Maseri, Wan Mohamad, et al.
Published: (2007) -
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)