2017 7th International Conference on Cloud Computing, Data Science &Amp; Engineering - Confluence 2017
DOI: 10.1109/confluence.2017.7943174
|View full text |Cite
|
Sign up to set email alerts
|

Parallel generation of RSA keys — A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…RSA represents the critical public-key cryptographic structure that is utilised in multiple online applications, including ecommerce and credit card processing over networks, key exchanges, and digital signatures [3,8]. The RSA algorithmic method is considered to be slower than symmetric-key algorithmic methods for it relies on modular exponentiations.…”
Section: Implementation Sequential Rsamentioning
confidence: 99%
See 1 more Smart Citation
“…RSA represents the critical public-key cryptographic structure that is utilised in multiple online applications, including ecommerce and credit card processing over networks, key exchanges, and digital signatures [3,8]. The RSA algorithmic method is considered to be slower than symmetric-key algorithmic methods for it relies on modular exponentiations.…”
Section: Implementation Sequential Rsamentioning
confidence: 99%
“…RSA was initially developed in 1977 by Rivest, Shamir, and Adleman [2,3,5,8,9] and is among the most critical algorithms applied in the authentication and encryption of data for secure transmission on open networks. RSA represents the critical public-key cryptographic structure that is utilised in multiple online applications, including ecommerce and credit card processing over networks, key exchanges, and digital signatures [3,8].…”
Section: Implementation Sequential Rsamentioning
confidence: 99%