SURVEY ON ASYMMETRIC ALGORITHM USING RSA
DIFFERENT MODIFIED MODELS
S. Tint. Computer Applications: An International Journal (CAIJ), 1 (2):
1-9(2014/11 2014)
Abstract
In the Internet we have been searching different kinds of papers describing Cryptography technique
imposed by many algorithms. Almost papers published in the Web are used popular algorithms. Among
them RSA is a very popular algorithm for security in the Web. We use attributes to summarize in the RSA
algorithm by means of well known parameters. Some papers are thought about cloud and others for
different environments. There is motivated to collect and summarize what are differences between them.
This paper focuses on a comprehensive analysis of different modified RSA algorithms and supplies the
recognition of RSA intensively. Most of sections are well composed for detail explanations about papers
studied as a list of numbers and a table.
%0 Journal Article
%1 tint2014survey
%A Tint, San San
%D 2014
%J Computer Applications: An International Journal (CAIJ)
%K computer
%N 2
%P 1-9
%T SURVEY ON ASYMMETRIC ALGORITHM USING RSA
DIFFERENT MODIFIED MODELS
%U http://airccse.com/caij/index.html
%V 1
%X In the Internet we have been searching different kinds of papers describing Cryptography technique
imposed by many algorithms. Almost papers published in the Web are used popular algorithms. Among
them RSA is a very popular algorithm for security in the Web. We use attributes to summarize in the RSA
algorithm by means of well known parameters. Some papers are thought about cloud and others for
different environments. There is motivated to collect and summarize what are differences between them.
This paper focuses on a comprehensive analysis of different modified RSA algorithms and supplies the
recognition of RSA intensively. Most of sections are well composed for detail explanations about papers
studied as a list of numbers and a table.
@article{tint2014survey,
abstract = {In the Internet we have been searching different kinds of papers describing Cryptography technique
imposed by many algorithms. Almost papers published in the Web are used popular algorithms. Among
them RSA is a very popular algorithm for security in the Web. We use attributes to summarize in the RSA
algorithm by means of well known parameters. Some papers are thought about cloud and others for
different environments. There is motivated to collect and summarize what are differences between them.
This paper focuses on a comprehensive analysis of different modified RSA algorithms and supplies the
recognition of RSA intensively. Most of sections are well composed for detail explanations about papers
studied as a list of numbers and a table.},
added-at = {2018-02-20T04:44:17.000+0100},
author = {Tint, San San},
biburl = {https://www.bibsonomy.org/bibtex/207e08d00e7d730f6f081fdd316c183ea/caij},
interhash = {631157df03125de57306274a405594af},
intrahash = {07e08d00e7d730f6f081fdd316c183ea},
journal = {Computer Applications: An International Journal (CAIJ)},
keywords = {computer},
month = {2014/11},
number = 2,
pages = {1-9},
timestamp = {2018-02-20T04:44:17.000+0100},
title = {SURVEY ON ASYMMETRIC ALGORITHM USING RSA
DIFFERENT MODIFIED MODELS},
url = {http://airccse.com/caij/index.html},
volume = 1,
year = 2014
}