Results 211 to 220 of about 244,652 (251)
Some of the next articles are maybe not open access.
2016 SAI Computing Conference (SAI), 2016
Today, RSA algorithm is the most widely used public-key cryptosystem around the world. It is used for security in everything from online shopping to cell phones. However, the basic RSA is not semantically secure, i.e., encrypting the same message more than once always gives the same ciphertext.
Abdallah Karakra, Ahmad Alsadeh
openaire +1 more source
Today, RSA algorithm is the most widely used public-key cryptosystem around the world. It is used for security in everything from online shopping to cell phones. However, the basic RSA is not semantically secure, i.e., encrypting the same message more than once always gives the same ciphertext.
Abdallah Karakra, Ahmad Alsadeh
openaire +1 more source
2010
Au travers des récits de Régis, Sylvie et Annabelle, cette bande dessinée met en lumière la réalité sociale de la pauvreté et de l'exclusion sociale en France et en particulier sur le territoire lorientais. (4e de couv.)
Stan Floresco +116 more
openaire +3 more sources
Au travers des récits de Régis, Sylvie et Annabelle, cette bande dessinée met en lumière la réalité sociale de la pauvreté et de l'exclusion sociale en France et en particulier sur le territoire lorientais. (4e de couv.)
Stan Floresco +116 more
openaire +3 more sources
�������������� ������������������ ������ �������������������������� RSA
2021RSA is a cryptosystem which was developed in 1977. It is one of the most popular cryptosystems and it is widely used in everyday life. However, entities who use RSA tend to use insecure input parameters, so as to speed up the decryption process or to increase computational power of the deciphering machine.
openaire +1 more source
2017
This paper proposes RSA parameters for which (1) key generation, encryption, decryption, signing, and verification are feasible on today’s computers while (2) all known attacks are infeasible, even assuming highly scalable quantum computers. As part of the performance analysis, this paper introduces a new algorithm to generate a batch of primes.
Bernstein, Daniel J. +3 more
openaire +1 more source
This paper proposes RSA parameters for which (1) key generation, encryption, decryption, signing, and verification are feasible on today’s computers while (2) all known attacks are infeasible, even assuming highly scalable quantum computers. As part of the performance analysis, this paper introduces a new algorithm to generate a batch of primes.
Bernstein, Daniel J. +3 more
openaire +1 more source
Digital automated RSA compared to manually operated RSA
Journal of Biomechanics, 2000The accuracy of digital Roentgen stereophotogrammetric analysis (RSA) was compared to the accuracy of a manually operated RSA system. For this purpose, we used radiographs of a phantom and radiographs of patients. The radiographs of the patients consisted of double examinations of 12 patients that had a tibial osteotomy and of double examinations of 12
E R, Valstar +4 more
openaire +2 more sources

