PROOF CHECKING THE RSA PUBLIC KEY ENCRYPTION ALGORITHM

被引:17
|
作者
BOYER, RS [1 ]
MOORE, JS [1 ]
机构
[1] UNIV TEXAS,INST COMP SCI & COMP APPLICAT,AUSTIN,TX 78712
来源
AMERICAN MATHEMATICAL MONTHLY | 1984年 / 91卷 / 03期
关键词
D O I
10.2307/2322356
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
引用
收藏
页码:181 / 189
页数:9
相关论文
共 50 条
  • [1] An efficient RSA public key encryption scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad A.
    Al-Fayoumi, Mustafa
    Jabbar, Haidar S.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 127 - +
  • [2] A MODIFICATION OF THE RSA PUBLIC-KEY ENCRYPTION PROCEDURE
    WILLIAMS, HC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1980, 26 (06) : 726 - 729
  • [3] RSA-Based Certificateless Public Key Encryption
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 24 - +
  • [4] Modified RSA Public Key Algorithm
    Aswathy, B. G.
    Resmi, R.
    [J]. 2014 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND COMMUNICATIONS (ICCSC), 2014, : 252 - 255
  • [5] Searchable Public Key Encryption Scheme with Data Integrity Checking
    JunYang
    Li, Shujuan
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 363 - 370
  • [6] New probabilistic public-key encryption based on the RSA cryptosystem
    Roman'kov, Vitalii A.
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2015, 7 (02) : 153 - 156
  • [7] An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)
    Imam R.
    Anwer F.
    Nadeem M.
    [J]. International Journal of Information Technology, 2022, 14 (5) : 2645 - 2656
  • [8] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    [J]. DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [9] On the conventional public key in identification-based encryption: The case of RSA
    Aouinatou, Rkia
    Belkasmi, Mostafa
    [J]. International Journal of Information and Computer Security, 2013, 5 (03) : 171 - 201
  • [10] Modified Trial Division Algorithm Using KNJ-Factorization Method To Factorize RSA Public Key Encryption
    Lal, Nidhi
    Singh, Anurag Prakash
    Kumar, Shishupal
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 992 - 995