2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726659
|View full text |Cite
|
Sign up to set email alerts
|

Pell's RSA key generation and its security analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…The proposed Modified RSA (MDSA) algorithm is examined on varying bit sizes of input. Performance of original RSA algorithm by Rivest, Shamir, and Adleman [17,18] are shown in Table 1. Also the performance of Modified RSA (MDSA) scheme in terms of encryption time and decryption is shown in Table 2.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…The proposed Modified RSA (MDSA) algorithm is examined on varying bit sizes of input. Performance of original RSA algorithm by Rivest, Shamir, and Adleman [17,18] are shown in Table 1. Also the performance of Modified RSA (MDSA) scheme in terms of encryption time and decryption is shown in Table 2.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Thus the security is increased by three levels instead of two levels in RSA making it difficult for attackers. S e g a r and V i j a y a r a g a v a n [27] developed a new approach where generation of keys is based on Pell's equation, which makes use of the roots of Diophantine equation. They also proposed and analysed its complexity with RSA variants.…”
Section: Rsa Variantsmentioning
confidence: 99%
“…The depth of these trees is unbalanced and overlapping, hence the performance is reduced in the multi-structure indexing methods. The various types of indexing and the query process sing are mentioned in [38] and further consideration in spatio-temporal is security mentioned in [34][35][36][37] these papers are mentioned various advanced security features. The PPFI [26], MSMON [32], PPFN* [33] and D-Tree [28] are the main past, present and future data prediction indexing methods and these methods are considered as comparison purpose.…”
Section: Related Workmentioning
confidence: 99%