Authentication system based on RSA encryption

被引:0
|
作者
Zhu, S.R.
Li, W.Q.
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] DICOM Image Authentication and Encryption Based on RSA and AES Algorithms
    Kannammal, A.
    Rani, S. Subha
    TRENDS IN INTELLIGENT ROBOTICS, AUTOMATION, AND MANUFACTURING, 2012, 330 : 349 - 360
  • [2] A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA
    Zhu, Lijuan
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2471 - 2474
  • [3] Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps
    Singh, Deep
    Kumar, Sandeep
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 274
  • [4] Identity Based Secure RSA Encryption System
    Jain, Meenal
    Singh, Manoj
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 429 - 437
  • [5] Improved chaos-RSA-based hybrid cryptosystem for image encryption and authentication
    Gafsi, Mohamed
    Amdouni, Rim
    Hajjaji, Mohamed Ali
    Malek, Jihene
    Mtibaa, Abdellatif
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [6] Modified RSA encryption algorithm based on chaos and its application in voice encryption system
    Yi, Wang
    Tan, Zhiping
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 439 - 444
  • [7] On the security of an RSA based encryption scheme
    Müller, S
    INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 135 - 148
  • [8] Broadcast encryption schemes based on RSA
    MU, Ning-bo
    HU, Yu-pu
    OU, Hai-wen
    Journal of China Universities of Posts and Telecommunications, 2009, 16 (01): : 69 - 75
  • [9] RSA accumulator based broadcast encryption
    Gentry, C
    Ramzan, Z
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 73 - 86
  • [10] New probabilistic encryption based on RSA
    Xi'an Dianzi Keji Daxue Xuebao, 4 (554-559):