2013
DOI: 10.1080/02533839.2012.737113
|View full text |Cite
|
Sign up to set email alerts
|

Parallel RSA encryption based on tree architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Although EAMRSA decreases the amount of processing required for decryption, it does so at the expense of encryption. In addition, Damrudi [64] suggested RSA encryption using a tree architecture in 2013 known as TRSA. Its parallel characteristics, such as scalability, connectivity processing components, degree, and diameter, are expressed using tree parallel architecture.…”
Section: B Parallelmentioning
confidence: 99%
“…Although EAMRSA decreases the amount of processing required for decryption, it does so at the expense of encryption. In addition, Damrudi [64] suggested RSA encryption using a tree architecture in 2013 known as TRSA. Its parallel characteristics, such as scalability, connectivity processing components, degree, and diameter, are expressed using tree parallel architecture.…”
Section: B Parallelmentioning
confidence: 99%
“…In the same year 2012, Masumeh Damrudi and Norafida Ithnin presented "Parallel RSA encryption based on tree architecture" [13]. In this paper they applied parallel processing on RSA using tree structure.…”
Section: Sh Tang Et Al Presented "Modular Exponentiation Using Parall...mentioning
confidence: 99%
“…Having the grid resistant to cyber threats is a strategic precaution to prevent unforeseeable damages in the event that two-way communication is blocked. e security concept in the smart grid should be regarded within a wide range as to the grids consisting of various types of communication systems such as GSM networks, fiber optic lines, WiMAX, RS-232 and RS-485, cable lines, radio frequency lines, and power system communication lines [4]. e development of high-security hardware and computing infrastructure to ensure that all these hardware and systems work reliably is a matter of working separately within smart grid operations.…”
Section: Introductionmentioning
confidence: 99%