Author:
Beşkirli Ayşe,Özdemir Durmuş,Beşkirli Mehmet
Publisher
European Journal of Science and Technology
Reference28 articles.
1. Akben, S. B., & Subaşı, A. (2005). RSA ve eliptik eğri algoritmasının performans karşılaştırması. KSÜ Fen ve Mühendislik Dergisi, 8(1), 35-40.
2. Ayele, A. A., & Sreenivasarao, V. (2013). A modified RSA encryption technique based on multiple public keys. International Journal of Innovative Research in Computer and Communication Engineering, 1(4), 859-864.
3. Çavuşoğlu, Ü., Akgül, A., Zengin, A., & Pehlivan, I. (2017). The design and implementation of hybrid RSA algorithm using a novel chaos based RNG. Chaos, Solitons & Fractals, 104, 655-667.
4. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644-654.
5. Dubey, A. K., Dubey, A. K., Namdev, M., & Shrivastava, S. S. (2012). Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. Paper presented at the Software Engineering (CONSEG), 2012 CSI Sixth International Conference on.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献