2018
DOI: 10.11591/ijeecs.v12.i2.pp447-454
|View full text |Cite
|
Sign up to set email alerts
|

Analysis Review on Public Key Cryptography Algorithms

Abstract: This paper presents several Public Key Cryptography (PKC) algorithms based on the perspective of researchers’ effort since it was invented in the last four decades. The categories of the algorithms had been analyzed which are Discrete Logarithm, Integer Factorization, Coding Theory, Elliptic Curve, Lattices, Digital Signature and Hybrid algorithms. This paper reviewed the previous schemes in different PKC algorithms. The aim of this paper is to present the comparative trends of PKC algorithms based on number o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…The main use of the RSA algorithm because it is the most secure key exchange mechanism [31], the appropriate domain for the implementation of this algorithm is to secure digital key transport signatures [32]. The stages of the RSA algorithm is described as follows [33]. − Procedure for generating keys a.…”
Section: Application Of Asymmetric Keys Using the Rsa Algorithmmentioning
confidence: 99%
“…The main use of the RSA algorithm because it is the most secure key exchange mechanism [31], the appropriate domain for the implementation of this algorithm is to secure digital key transport signatures [32]. The stages of the RSA algorithm is described as follows [33]. − Procedure for generating keys a.…”
Section: Application Of Asymmetric Keys Using the Rsa Algorithmmentioning
confidence: 99%
“…Therefore, several image encryption techniques have been designed over years. Some of these techniques include optical encryption [1] block-based encryption [2], [3] decomposition encryption [4], public key and distributive key encryption [5], [6] deoxyribonucleic acid (DNA) and genetic encryption [7], digital image encryption [8], [9] and others.…”
Section: Introductionmentioning
confidence: 99%