2017
DOI: 10.1016/j.mejo.2017.03.009
|View full text |Cite
|
Sign up to set email alerts
|

Design of RSA processor for concurrent cryptographic transformations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…The chat electronic messaging setting showed a good potential to host real time interactive interaction system that is supported by RSA coding methodology to preserve the safety of the message stream [15] [16]. Choosing the key size in RSA coding is of nice importance because the size of the key will increase, the safety level of the system, the quality and also the resistance of encrypted text will increase [15] [17]. These blessings build it troublesome to decode cipher texts and break passwords.…”
Section: Proposed Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…The chat electronic messaging setting showed a good potential to host real time interactive interaction system that is supported by RSA coding methodology to preserve the safety of the message stream [15] [16]. Choosing the key size in RSA coding is of nice importance because the size of the key will increase, the safety level of the system, the quality and also the resistance of encrypted text will increase [15] [17]. These blessings build it troublesome to decode cipher texts and break passwords.…”
Section: Proposed Systemmentioning
confidence: 99%
“…These blessings build it troublesome to decode cipher texts and break passwords. However, additionally to those advantages, the coding key creation time, text coding time, and mobile device RAM consumption increase [17] [18]. These disadvantages area unit factors which will influence the effective use of the applying.…”
Section: Proposed Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…If modulus is factored as prime numbers, RSA is broken. Therefore, the modulus should be assigned at least 1024 bits [13][14][15] to avoid an attack by intruders.…”
Section: Introductionmentioning
confidence: 99%