DNA sequences compression by GP2R and selective encryption using modified RSA technique
Humans, by nature, have always been fascinated by the possibility of being able to acquire more information in minimum possible time and space. The effective lossless compression method, effective data structure, and DNA (Deoxyribonucleic Acid) data searching are quite essential as they provide a st...
| Main Authors: | Hossein, Syed Mahamud, De, Debashis, Mohapatra, Pradeep Kumar Das, Mondal, Sankar Prasad, Ahmadian, Ali, Ghaemi, Ferial, Senu, Norazak |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/88499/ http://psasir.upm.edu.my/id/eprint/88499/1/ABSTRACT.pdf |
Similar Items
QCA based error detection circuit for nano communication network
by: Das, Jadav, et al.
Published: (2019)
by: Das, Jadav, et al.
Published: (2019)
Electrically doped nanoscale devices using first-principle approach: a comprehensive survey
by: Dey, Debarati, et al.
Published: (2021)
by: Dey, Debarati, et al.
Published: (2021)
Reversible palm vein authenticator design with quantum dot cellular automata for information security in nanocommunication network
by: Debnath, Bikash, et al.
Published: (2020)
by: Debnath, Bikash, et al.
Published: (2020)
The pentagonal fuzzy number: its different representations, properties, ranking, defuzzification and application in game problems
by: Chakraborty, Avishek, et al.
Published: (2019)
by: Chakraborty, Avishek, et al.
Published: (2019)
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
Disjunctive representation of triangular bipolar neutrosophic numbers, de-bipolarization technique and application in multi-criteria decision-making problems
by: Chakraborty, Avishek, et al.
Published: (2019)
by: Chakraborty, Avishek, et al.
Published: (2019)
The pentagonal fuzzy number:its different representations, properties, ranking, defuzzification and application in game problems
by: Chakraborty, Avishek, et al.
Published: (2019)
by: Chakraborty, Avishek, et al.
Published: (2019)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Improve cloud computing security using RSA encryption with Fermat's little theorem
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
Image compression and encryption
by: Zainal Abidin, Zuhairiah
Published: (2003)
by: Zainal Abidin, Zuhairiah
Published: (2003)
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
Circuit level modeling of electrically doped adenine–thymine nanotube based field effect transistor
by: Dey, Debarati, et al.
Published: (2020)
by: Dey, Debarati, et al.
Published: (2020)
Different forms of triangular neutrosophic numbers, de-neutrosophication techniques, and their applications
by: Chakraborty, Avishek, et al.
Published: (2018)
by: Chakraborty, Avishek, et al.
Published: (2018)
Arbitrary-order economic production quantity model with and without deterioration: generalized point of view
by: Rahaman, Mostafijur, et al.
Published: (2020)
by: Rahaman, Mostafijur, et al.
Published: (2020)
Partial Encryption of Compressed Images Employing FPGA
by: Reaz, M.B.I., et al.
Published: (2005)
by: Reaz, M.B.I., et al.
Published: (2005)
Partial encryption of compressed images employing FPGA
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Synthesis of different types of carbon nanostructure on carbon fiber and their application as fillers in polypropylene composite
by: Ghaemi, Ferial
Published: (2015)
by: Ghaemi, Ferial
Published: (2015)
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
Kriptosistem Multi-Rsa
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
New Image Encryption and Compression Method Based on Independent Component Analysis
by: Alfalou, A., et al.
Published: (2008)
by: Alfalou, A., et al.
Published: (2008)
Exponential increment of RSA attack range via lattice based cryptanalysis
by: Nitaj, Abderahmanne, et al.
Published: (2021)
by: Nitaj, Abderahmanne, et al.
Published: (2021)
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Introducing S-index into factoring RSA modulus via Lucas sequences
by: Abu, Nur Azman, et al.
Published: (2017)
by: Abu, Nur Azman, et al.
Published: (2017)
Allosteric Modulation of the HIV-1 gp120-gp41 Association Site by Adjacent gp120 Variable Region 1 (V1) N-Glycans Linked to Neutralization Sensitivity
by: Drummer, H., et al.
Published: (2013)
by: Drummer, H., et al.
Published: (2013)
Thermally stable carbon nanofibers functionalized with poly(dimethylsiloxane) for solid-phase microextraction of polycyclic aromatic hydrocarbons prior to GC analysis
by: Amiri, Amirhassan, et al.
Published: (2016)
by: Amiri, Amirhassan, et al.
Published: (2016)
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
Effects of thickness and amount of carbon nanofiber coated carbon fiber on improving the mechanical properties of nanocomposites
by: Ghaemi, Ferial, et al.
Published: (2016)
by: Ghaemi, Ferial, et al.
Published: (2016)
Synthesis of carbon nanotube-carbon nanosphere on the CF surface by CVD
by: Ghaemi, Ferial, et al.
Published: (2016)
by: Ghaemi, Ferial, et al.
Published: (2016)
A comparative S-index in factoring RSA modulus via Lucas sequences
by: Abu, Nur Azman, et al.
Published: (2016)
by: Abu, Nur Azman, et al.
Published: (2016)
Security issues of Novel RSA variant
by: Nitaj, Abderrahmane, et al.
Published: (2022)
by: Nitaj, Abderrahmane, et al.
Published: (2022)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
Modified multi prime RSA cryptosystem
by: Kamardan, M. Ghazali, et al.
Published: (2018)
by: Kamardan, M. Ghazali, et al.
Published: (2018)
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005)
by: Kamardan, Muhammad Ghazali
Published: (2005)
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005)
by: Kamardan, Muhammad Ghazali
Published: (2005)
Essential prescribing tips for GP Associates-in-Training
by: Gookey, Gill, et al.
Published: (2018)
by: Gookey, Gill, et al.
Published: (2018)
Similar Items
-
QCA based error detection circuit for nano communication network
by: Das, Jadav, et al.
Published: (2019) -
Electrically doped nanoscale devices using first-principle approach: a comprehensive survey
by: Dey, Debarati, et al.
Published: (2021) -
Reversible palm vein authenticator design with quantum dot cellular automata for information security in nanocommunication network
by: Debnath, Bikash, et al.
Published: (2020) -
The pentagonal fuzzy number: its different representations, properties, ranking, defuzzification and application in game problems
by: Chakraborty, Avishek, et al.
Published: (2019) -
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)