2015
DOI: 10.5121/ijcsa.2015.5108
|View full text |Cite
|
Sign up to set email alerts
|

State of the Art Parallel Approaches For Rsa Public Key Based Cryptosystem

Abstract: RSA is one of the most popular Public

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Saxena and Kapoor [13] presented a survey of different parallel implementations of the RSA algorithm in 2015, which included a wide range of hardware and software implementations. Parallel programming is a new area of research that aims to improve performance and efficiency by utilizing multi-core processors to execute instructions more quickly and efficiently.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Saxena and Kapoor [13] presented a survey of different parallel implementations of the RSA algorithm in 2015, which included a wide range of hardware and software implementations. Parallel programming is a new area of research that aims to improve performance and efficiency by utilizing multi-core processors to execute instructions more quickly and efficiently.…”
Section: Related Workmentioning
confidence: 99%
“…5, we can easily notice that the Hybrid domain, Parallel domain and Mathematical modifications in the "Core-Modifications" domain are the most popular domains as far as RSA variant proposals are concerned. • Overall execution speed and relative security are the most common objectives of all the under-studied literature, as can be depicted from Table [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17], while some fewer common objectives include the enhancement of RSA in respect to a particular domain like Cloud, Image or Wireless areas. • Since the standard RSA proposal in 1978, its initial yearly research in RSA's enhancements was quite less in • Of all the RSA proposals focusing on increasing the security levels, most of them try to increase the algorithm complexity, which subsequently increases the overall time to break the proposed cipher, hence in this way, their proposal implies higher security in comparison to the standard RSA algorithm.…”
Section: Findings and Indicationsmentioning
confidence: 99%
“…The number of iterations is equal to the number of bits in the binary representation of the indicator, but the result includes only those in which the corresponding bit is equal to 1. The result is obtained according to the following formula [15]:…”
Section: Parallelization Of the Rsa Algorithmmentioning
confidence: 99%
“…Public Key-based cryptography concept is using a private and a public key [47]. There are many public key cryptography algorithms such as Rivest Shamir Adleman (RSA) [48,49], Diffie-Hellman (DH), digital signature algorithm (DSA), ELGamal [50,51], and ECC [52]. In the public key cryptography, a public key is made freely available to anyone who might want to send a message and a private key is kept secret.…”
Section: Public Key-based Authenticationmentioning
confidence: 99%