Thirumalai et al., 2020 - Google Patents
An efficient public key secure scheme for cloud and IoT securityThirumalai et al., 2020
- Document ID
- 6343294270089372729
- Author
- Thirumalai C
- Mohan S
- Srivastava G
- Publication year
- Publication venue
- Computer Communications
External Links
Snippet
Abstract According to the National Institute of Standard and Technology (NIST), the security level of RSA is safe when it is N-bit modulus≥ 2048 bits. Because of this, the processing time to generate asymmetric keys also increases. Taking this into account, an efficient and …
- 238000000034 method 0 abstract description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thirumalai et al. | An efficient public key secure scheme for cloud and IoT security | |
Tahir et al. | CryptoGA: a cryptosystem based on genetic algorithm for cloud data security | |
Chen et al. | Double-blockchain assisted secure and anonymous data aggregation for fog-enabled smart grid | |
Vahdati et al. | Comparison of ECC and RSA algorithms in IoT devices | |
US10367637B2 (en) | Modular exponentiation with transparent side channel attack countermeasures | |
Kuang et al. | A new quantum-safe multivariate polynomial public key digital signature algorithm | |
Sharma et al. | A hybrid cryptographic technique for file storage mechanism over cloud | |
Irshad et al. | Iot-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain based approach towards a trustworthy cloud computing | |
Ukwuoma et al. | Post-quantum cryptography-driven security framework for cloud computing | |
Drucker et al. | Combining homomorphic encryption with trusted execution environment: a demonstration with paillier encryption and SGX | |
Kumari et al. | To secure the communication in powerful internet of things using innovative post-quantum cryptographic method | |
Berguig et al. | Anonymous and lightweight secure authentication protocol for mobile Agent system | |
Raeisi-Varzaneh et al. | Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies | |
AbuJoodeh | Exploring and Adapting AES Algorithm for Optimal Use as a Lightweight IoT Crypto Algorithm | |
Singh et al. | Dsse: distributed security shielded execution for communicable cyber threats analysis | |
Thirumalai et al. | Modelling a side channel resistant CHAN-PKC cryptomata for medical data security | |
Yakubu et al. | Blockchain-based privacy and security model for transactional data in large private networks | |
Alnasser et al. | Encryption Algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations | |
Oliveira et al. | The computer for the 21st century: security & privacy challenges after 25 years | |
Shekhar Mondal et al. | A RSA-based efficient dynamic secure algorithm for ensuring data security | |
Kabin et al. | Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks | |
Akter et al. | RSA and AES based hybrid encryption technique for enhancing data security in cloud computing | |
Wang et al. | Secure and Flexible Data Sharing With Dual Privacy Protection in Vehicular Digital Twin Networks | |
Imam et al. | An empirical study of secure and complex variants of RSA scheme | |
Alabdulatif | Practical hybrid confidentiality-based analytics framework with Intel SGX |