Author:
Abdullah Kamilah,Bakar Sumarni Abu,Kamis Nor Hanimah,Aliamis Hardi
Reference26 articles.
1. G. Durfee, Ph.D. thesis, Stanford University, 2002.
2. A method for obtaining digital signatures and public-key cryptosystems
3. D. Boneh, Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999).
4. H. M. Sun, W. C. Yang and C. S. Laih, “On the design of RSA with short secret exponent,” in Adv. In Cryptology ’99, edited by K. Y. Lam, E. Okamoto and C. Xing (Singapore, 1999), pp. 150–164.
5. R. J. Hwang, F. F. Su, Y. S. Yeh and C. Y. Chen, “An efficient decryption method for RSA cryptosystem,” in Adv Infor Netw and Applications, (Taiwan, 2005), pp. 585–590.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Symmetric Encryption Scheme Based on Fuzzy Graph;Algorithms for Intelligent Systems;2024
2. AES Based White Box Cryptography in Digital Signature Verification;Sensors;2022-12-02
3. Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security;Computers, Materials & Continua;2022
4. More secure on the DL-encryption schemes using the TFM function;PROCEEDING OF THE 1ST INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN PURE AND APPLIED SCIENCE (ICARPAS2021): Third Annual Conference of Al-Muthanna University/College of Science;2022
5. Construction of T-Vague Groups for Real-Valued Interference Channel;Advances in Intelligent Systems and Computing;2021-12-09