-
1
A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA
Published 2024-12-01Subjects: “…rsa…”
Get full text
Article -
2
IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS
Published 2024-12-01Subjects: Get full text
Article -
3
Factorization of big integer and the security of RSA
Published 2017-05-01Subjects: Get full text
Article -
4
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01Subjects: Get full text
Article -
5
A high offset stem design does not increase stem migration under full weight bearing in cementless total hip arthroplasty: a model-based RSA study
Published 2025-02-01Subjects: “…Cementless THA; Femoral offset; Radiostereometric analysis; RSA…”
Get full text
Article -
6
DNA algorithm of primeness test based on finite automaton
Published 2006-01-01Subjects: Get full text
Article -
7
Jidoka-DT simulator programmed by hybridize XGboost-LSTM to evaluate helmets quality produced by Rice-Straw-alumina plastic dough to resist shocks and impenetrable
Published 2025-03-01Subjects: “…RSA-Plastic…”
Get full text
Article -
8
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory
Published 2024-03-01Subjects: Get full text
Article -
9
Neuroanatomical and functional substrates of the short video addiction and its association with brain transcriptomic and cellular architecture
Published 2025-02-01Subjects: Get full text
Article -
10
-
11
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01Subjects: Get full text
Article -
12
Password authentication scheme for mobile computing environment
Published 2007-01-01Subjects: Get full text
Article -
13
Cloud storage scheme based on closed-box encryption
Published 2017-07-01Subjects: Get full text
Article -
14
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01Subjects: Get full text
Article -
15
Research on Security Algorithm for Crossing Heterogeneous Network Based on Unified Communication Technology
Published 2013-12-01Subjects: Get full text
Article -
16
Decoding the physics of observed actions in the human brain
Published 2025-02-01Subjects: Get full text
Article -
17
Two improved content extraction signature schemes
Published 2017-04-01Subjects: Get full text
Article -
18
Efficient revocable attribute-based encryption scheme
Published 2019-06-01Subjects: Get full text
Article -
19
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01Subjects: “…RSA cryptosystem…”
Get full text
Article -
20