Nothing Special   »   [go: up one dir, main page]

Thirumalai et al., 2020 - Google Patents

An efficient public key secure scheme for cloud and IoT security

Thirumalai et al., 2020

Document ID
6343294270089372729
Author
Thirumalai C
Mohan S
Srivastava G
Publication year
Publication venue
Computer Communications

External Links

Snippet

Abstract According to the National Institute of Standard and Technology (NIST), the security level of RSA is safe when it is N-bit modulus≥ 2048 bits. Because of this, the processing time to generate asymmetric keys also increases. Taking this into account, an efficient and …
Continue reading at www.sciencedirect.com (other versions)

Similar Documents

Publication Publication Date Title
Thirumalai et al. An efficient public key secure scheme for cloud and IoT security
Tahir et al. CryptoGA: a cryptosystem based on genetic algorithm for cloud data security
Chen et al. Double-blockchain assisted secure and anonymous data aggregation for fog-enabled smart grid
Vahdati et al. Comparison of ECC and RSA algorithms in IoT devices
US10367637B2 (en) Modular exponentiation with transparent side channel attack countermeasures
Kuang et al. A new quantum-safe multivariate polynomial public key digital signature algorithm
Sharma et al. A hybrid cryptographic technique for file storage mechanism over cloud
Irshad et al. Iot-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain based approach towards a trustworthy cloud computing
Ukwuoma et al. Post-quantum cryptography-driven security framework for cloud computing
Drucker et al. Combining homomorphic encryption with trusted execution environment: a demonstration with paillier encryption and SGX
Kumari et al. To secure the communication in powerful internet of things using innovative post-quantum cryptographic method
Berguig et al. Anonymous and lightweight secure authentication protocol for mobile Agent system
Raeisi-Varzaneh et al. Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies
AbuJoodeh Exploring and Adapting AES Algorithm for Optimal Use as a Lightweight IoT Crypto Algorithm
Singh et al. Dsse: distributed security shielded execution for communicable cyber threats analysis
Thirumalai et al. Modelling a side channel resistant CHAN-PKC cryptomata for medical data security
Yakubu et al. Blockchain-based privacy and security model for transactional data in large private networks
Alnasser et al. Encryption Algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations
Oliveira et al. The computer for the 21st century: security & privacy challenges after 25 years
Shekhar Mondal et al. A RSA-based efficient dynamic secure algorithm for ensuring data security
Kabin et al. Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks
Akter et al. RSA and AES based hybrid encryption technique for enhancing data security in cloud computing
Wang et al. Secure and Flexible Data Sharing With Dual Privacy Protection in Vehicular Digital Twin Networks
Imam et al. An empirical study of secure and complex variants of RSA scheme
Alabdulatif Practical hybrid confidentiality-based analytics framework with Intel SGX