90
Views
8
CrossRef citations to date
0
Altmetric
Articles

A novel accelerated implementation of RSA using parallel processing

, , , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Jun-Jie Liu, Kang-Too Tsang & Yu-Hui Deng. (2022) A variant RSA acceleration with parallelisation. International Journal of Parallel, Emergent and Distributed Systems 37:3, pages 318-332.
Read now
Kritsanapong Somsuk. (2022) The alternative method to speed up RSA’s decryption process. Journal of Discrete Mathematical Sciences and Cryptography 0:0, pages 1-22.
Read now
Sudhakar Kumar, Sunil Kr. Singh, Naveen Aggarwal & Kriti Aggarwal. (2021) Evaluation of automatic parallelization algorithms to minimize speculative parallelism overheads: An experiment. Journal of Discrete Mathematical Sciences and Cryptography 24:5, pages 1517-1528.
Read now

Articles from other publishers (5)

Erkam Luy, Zekeriya Y. Karatas & Olcay Ciftci. (2022) Comment on “An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)”. Information Processing Letters 177, pages 106263.
Crossref
R. Dheekksha, Adrian Nirmal Andrew, B.S. Rakshana, T Subbulakshmi, Pranjal Aggarwal & Bhavyadeep Jagani. (2021) Design and Development of a Secure Password Vault using RSA Parallelization. Design and Development of a Secure Password Vault using RSA Parallelization.
Raza Imam, Qazi Mohammad Areeb, Abdulrahman Alturki & Faisal Anwer. (2021) Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status. IEEE Access 9, pages 155949-155976.
Crossref
Osama F. AbdelWahab, Ashraf A.M. Khalaf, Aziza I. Hussein & Hesham F. A. Hamed. (2021) Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques. IEEE Access, pages 1-1.
Crossref
Osama F. AbdelWahab, Aziza I. Hussein, Hesham F.A. Hamed, Hamdy M. Kelash & Ashraf A.M. Khalaf. (2021) Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data. Procedia Computer Science 182, pages 5-12.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.