Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/14675
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rathod U. | |
dc.contributor.author | Sreenivas S. | |
dc.contributor.author | Chandavarkar B.R. | |
dc.date.accessioned | 2021-05-05T10:15:39Z | - |
dc.date.available | 2021-05-05T10:15:39Z | - |
dc.date.issued | 2021 | |
dc.identifier.citation | Lecture Notes in Electrical Engineering , Vol. 698 , , p. 139 - 149 | en_US |
dc.identifier.uri | https://doi.org/10.1007/978-981-15-7961-5_14 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/14675 | - |
dc.description.abstract | RSA Public Key Cryptography (PKC) otherwise called asymmetric encryption, comprises of two keys known as public key and private key. While the sender utilizes receiver’s public key to encrypt the message, the receiver’s private key is utilized for decrypting the message, so there is no compelling reason to share a private key as in symmetric cryptography which requires sharing a private key. This paper means to investigate RSA and its variants, study its qualities and shortcomings, and propose inventive answers for conquer the shortcoming. RSA is extraordinary compared to other asymmetric key cryptographic algorithms in correspondence over systems. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. | en_US |
dc.title | Comparative Study Between RSA Algorithm and Its Variants: Inception to Date | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.