Service restrictions from February 12-22, 2026—more information on the University Library website

Showing 1 - 20 of 1,883

1

Enhancing security in real time AI based applications using hidden Markov model security algorithm comparing with RSA algorithm.
Anithaashri, T. P. ; Lalitha, R. ; Velmurugan, N.
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-6. 6p.

SPSS (Computer software) RSA algorithm SECURITY management CIPHERS STATISTICAL accuracy ARTIFICIAL intelligence
Conference
Save to List
2

A Chaotic Image Encryption Algorithm Based on Optimization and DNA Sequence.
Xu, Qicheng ; Lin, Ruigan ; Zhang, Hongrui ; et al.
International Journal of Bifurcation & Chaos in Applied Sciences & Engineering. Dec2025, Vol. 35 Issue 15, p1-24. 24p.

IMAGE encryption RSA algorithm CRYPTOGRAPHY DNA sequencing GENETIC algorithms CHAOS theory
Academic journal
Save to List
3

Computing φ(N) for an RSA module with a single quantum query.
Dieulefait, Luis Víctor ; Urroz, Jorge
Quantum Information Processing. Dec2025, Vol. 24 Issue 12, p1-13. 13p.

ALGORITHMS RSA algorithm MODULAR arithmetic FACTORIZATION QUANTUM computing CRYPTOGRAPHY
Academic journal
Save to List
4

Enhancing data security through novel hybrid encryption method integrating with RSA asymmetric key technique and new symmetric key algorithm.
Kuppuswamy, Prakash ; Mani, Mohan ; Gupta, Saroj Kumar ; et al.
AIP Conference Proceedings. 10/31/2025, Vol. 3343 Issue 1, p1-6. 6p.

CRYPTOGRAPHY RSA algorithm COMPUTER network securit... DATA protection DATA encryption SYMMETRIC-key algorithms
Conference
Save to List
5

AI and Trust.
Schneier, Bruce
Communications of the ACM; Aug2025, Vol. 68 Issue 8, p29-33, 5p

ARTIFICIAL intelligence ARTIFICIAL intelligence... ARTIFICIAL intelligence... TRUST RSA algorithm INTERNET security
Journal
Save to List
6

An Improved Attack on the RSA Variant Based on Cubic Pell Equation.
Rahmani, Mohammed ; Nitaj, Abderrahmane ; Tadmori, Abdelhamid ; et al.
Cryptography (2410-387X). Jun2025, Vol. 9 Issue 2, p40. 16p.

CRYPTOGRAPHY RSA algorithm CUBIC equations DIOPHANTINE equations MODULAR arithmetic
Academic journal
Save to List
7

Comparative analysis of the adaptation of cookie guard with Rivest-Shamir-Adleman encryption using random forest and histogram-based outlier score.
Karthikeyan, R. ; Kumar, S. Magesh
AIP Conference Proceedings. 2025, Vol. 3300 Issue 1, p1-6. 6p.

RANDOM forest algorithms RSA algorithm STATISTICAL accuracy INTERNET security OUTLIER detection MULTIPLE comparisons (St...
Conference
Save to List
8

QR-code based training certificate authenticity verification application by implementing RSA algorithm.
Sugiharto, Tito ; Ubaidi, Albet ; Budianto, Heru ; et al.
AIP Conference Proceedings. 2025, Vol. 3141 Issue 1, p1-10. 10p.

INDONESIA RSA algorithm CRYPTOGRAPHY TWO-dimensional bar code... SOFTWARE validation DATA encryption
Conference
Save to List
9

To secure data classified by SVM methods and stored in the cloud using 3-Tier hybrid encryption algorithm.
Kavuri, Venkata Ramaiah ; Anithaashri, T. P.
AIP Conference Proceedings; 2026, Vol. 3345 Issue 1, p1-10, 10p

CLOUD computing security... DATA encryption RSA algorithm SUPPORT vector machines ADVANCED Encryption Stan... BLOCK ciphers
Conference
Save to List
10

Improving the success rate of quantum algorithm attacking RSA encryption system.
Dong, Yumin ; Liu, Hengrui ; Fu, Yanying ; et al.
Journal of Applied Physics. 7/14/2023, Vol. 134 Issue 2, p1-10. 10p.

RSA algorithm COMPOSITE numbers DECOMPOSITION method PUBLIC key cryptography QUANTUM cryptography
Academic journal
Save to List
11

Another Approach to Factoring by Continued Fractions
Turgut Hanoymak ; Cihan Kayak
Volume: 17, Issue: 133-46
Turkish Journal of Mathematics and Computer Science

Factorization algorithms continued fractions RSA algorithm cryptography Cryptography Kriptografi
Academic journal
Save to List
12

Influence of the Void Structure on Thermal Performance in HGM/ER Composites.
Ding, Yu ; Dong, Zhaoyan ; Xu, Hong ; et al.
Energies (19961073). Apr2025, Vol. 18 Issue 8, p2073. 18p.

RSA algorithm THERMAL conductivity HEAT transfer EPOXY resins CELL anatomy
Academic journal
Save to List
13

Real-Time Power Management of Plug-In Electric Vehicles and Renewable Energy Sources in Virtual Prosumer Networks with Integrated Physical and Network Security Using Blockchain.
Sifakis, Nikolaos ; Armyras, Konstantinos ; Kanellos, Fotis
Energies (19961073). Feb2025, Vol. 18 Issue 3, p613. 63p.

RENEWABLE energy sources RSA algorithm ELECTRIC power managemen... VIRTUAL networks COMPUTER network securit...
Academic journal
Save to List
14

Accuracy analysis for secured file sharing by comparing RSA with blowfish.
Prasad, V. Bhanu ; Arul, U.
AIP Conference Proceedings. 2025, Vol. 3252 Issue 1, p1-6. 6p.

RSA algorithm STATISTICAL significance PUFFERS (Fish) INFORMATION sharing SAMPLE size (Statistics)
Conference
Save to List
15

Strengthening file encryption with AES-RSA hybrid algorithm: A critical review of strengths, weaknesses, and future directions.
Najm, Manar K. ; Noor, Ali O. Abid
AIP Conference Proceedings. 2025, Vol. 3169 Issue 1, p1-13. 13p.

ADVANCED Encryption Stan... RSA algorithm RESEARCH personnel ALGORITHMS
Conference
Save to List
18

Multidimensional Multiplexing Nested Optical Encryption of Programmable Holographic Structured Light Based on Photoalignment Liquid Crystal Elements.
Chen, Fangfang ; Zheng, Jihong ; Wang, Yushuai ; et al.
Laser & Photonics Reviews; 12/3/2025, Vol. 19 Issue 23, p1-10, 10p

MULTIPLEXING LIQUID crystals RSA algorithm OPTICAL modulation OPTICAL devices
Academic journal
Save to List
19

Evaluation of Digital Signatures Using RSA and HMAC Algorithms.
Natho, Parinya ; Boonmee, Salinun ; Khongkrairoek, Natthinee
Engineering, Technology & Applied Science Research; Dec2025, Vol. 15 Issue 6, p29509-29514, 6p

DIGITAL signatures RSA algorithm BENCHMARK problems (Comp... MESSAGE authentication c... DIGITAL communications DATA integrity
Academic journal
Save to List
20

Securing RSA Algorithm Against Side Channel Attacks.
Gebali, Fayez ; Magdy, Alshimaa
Telecom; Dec2025, Vol. 6 Issue 4, p80, 22p

RSA algorithm HAMMING weight RESEARCH evaluation CRYPTOGRAPHY ALGORITHMS PUBLIC key cryptography
Academic journal
Save to List

Filter