Research trends review on RSA scheme of asymmetric cryptography techniques
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network,...
Main Authors: | Ahmad, J.I (Author), Din, R. (Author), Mohamad, M.S.A (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Advanced Engineering and Science
2021
|
Series: | Bulletin of Electrical Engineering and Informatics
|
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
Similar Items
-
Cache-Timing Attacks on RSA Key Generation
by: Alejandro Cabrera Aldaya, et al.
Published: (2019-08-01) -
A New LSB Attack on Special-Structured RSA Primes
by: Amir Hamzah Abd Ghafar, et al.
Published: (2020-05-01) -
Analysis review on public key cryptography algorithms
by: Ahmad, J.I, et al.
Published: (2018) -
Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)
by: Bommireddipalli, Nithesh Venkata Ramana Surya
Published: (2017) -
RSA, Public-Key Cryptography, and Authentication Protocols
by: Wright, Moriah E.
Published: (2012)