Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 2 SI
Page No. 6189 - 6194

An Amended RSA Algorithm for Secure Communication

Authors : NishaP. Shetty

References

Ahmad, S., K.M.R. Alam, H. Rahman and S. Tamura, 2015. A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. Proceedings of the International IEEE Conference on Networking Systems and Security (NSYSS), January 5-7, 2015, IEEE, Dhaka, Bangladesh, ISBN:978-1-4799-8127-4, pp: 1-5.

Al-Vahed, A. and H. Sahhavi, 2011. An overview of modern cryptography. World Applied Program., 1: 55-61.
Direct Link  |  

Babu, E.S., C. Nagaraju and M.H.M.K. Prasad, 2015. A secure routing protocol against heterogeneous attacks in wireless adhoc networks. Proceedings of the 6th ACM International Conference on Computer and Communication Technology (ICCCT '15), September 25-27, 2015, ACM, Allahabad, India, ISBN:978-1-4503-3552-2, pp: 339-344.

Bahadori, M., M.R. Mali, O. Sarbishei, M. Atarodi and M. Sharifkhani, 2010. A novel approach for secure and fast generation of RSA public and private keys on smartcard. Proceedings of the 8th IEEE International Conference on NEWCAS, June 20-23, 2010, IEEE, Montreal, Quebec, ISBN:978-1-4244-6806-5, pp: 265-268.

Bhattacharyya, S., 2011. Hiding data in text through changing in alphabet letter patterns (CALP). J. Global Res. Comput. Sci., 2: 33-39.

Bilal, I., R. Kumar, M.S. Roj and P.K. Mishra, 2014. Recent advancement in audio steganography. Proceedings of the International Conference on Parallel, Distributed and Grid Computing, December 11-13, 2014, IEEE, Solan, India, ISBN:978-1-4799-7682-9, pp: 402-405.

Boneh, D. and H. Shacham, 2002. Fast variants of RSA. CryptoBytes, 1: 1-9.

Chandra, S., S. Paira, S.S. Alam and G. Sanyal, 2014. A comparative survey of symmetric and asymmetric key cryptography. Proceedings 2014 International Conference on Electronics, Communication and Computational Engineering, November 17-18, 2014, IEEE, Hosur, India, ISBN:978-1-4799-5748-4, pp: 83-93.

Chang, W.L., M. Guo and M.S.H. Ho, 2005. Fast parallel molecular algorithms for DNA-based computation: Factoring integers. IEEE Trans. NanoBiosci., 4: 149-163.
CrossRef  |  Direct Link  |  

Dasgupta, K., J.K. Mondal and P. Dutta, 2013. Optimized video steganography using Genetic Algorithm (GA). Procedia Technol., 10: 131-137.
Direct Link  |  

Ibrahim, R. and L.C. Kee, 2012. MoBiSiS: An android-based application for sending stego image through MMS. Proceedings of the 7th International Multi-Conference on Computing in the Global Information Technology ICCGI, June 24-29, 2012, IARIA, Venice, Italy, pp: 115-120.

Ibrahim, R. and T.S. Kuan, 2011. Steganography algorithm to hide secret message inside an image. Comput. Technol. Appl., 2: 102-108.
Direct Link  |  

Jindal, P. and B. Singh, 2015. RC4 encryption: A literature survey. Procedia Comput. Sci., 46: 697-705.
Direct Link  |  

Johri, P., A. Mishra, S. Das and A. Kumar, 2016. Survey on steganography methods (text, image, audio, video, protocol and network steganography). Proceedings of the 3rd International IEEE Conference on Computing for Sustainable Global Development (INDIACom), March 16-18, 2016, IEEE, New Delhi, India, ISBN:978-1-4673-9417-8, pp: 2906-2909.

Kaur, S., S. Bansal and R.K. Bansal, 2014. Steganography and classification of image steganography techniques. Proceedings of the International IEEE Conference on Computing for Sustainable Global Development (INDIACom), March 5-7, 2014, IEEE, New Delhi, India, ISBN:978-93-80544-10-6, pp: 870-875.

Khan, A.H., A.H. Lone and F.A. Badroo, 2015. The applicability of genetic algorithm in cryptanalysis: A survey. Intl. J. Comput. Appl., 130: 42-46.
CrossRef  |  Direct Link  |  

Majumder, A. and S. Changder, 2013. A novel approach for text steganography: Generating text summary using reflection symmetry. Procedia Technol., 10: 112-120.
Direct Link  |  

Mane, R.R., 2015. A review on cryptography algorithms, attacks and encryption tools. Intl. J. Innovat. Res. Comput. Commun. Eng., 3: 8509-8514.
Direct Link  |  

Ping, X.X. and T. Zhang, 2006. Steganography in compressed Video stream. Proceedings of the 1st IEEE International Conference on Innovative Computing, Information and Control, (ICICIC) Vol. 1, August 30-September 1, 2006, IEEE, Beijing, China, ISBN:0-7695-2616-0, pp: 269-272.

Podilchuk, C.I. and E.J. Delp, 2001. Digital watermarking: Algorithms and applications. IEEE. Signal Process. Mag., 18: 33-46.
CrossRef  |  Direct Link  |  

Rawat, A. and S. Walfish, 2003. A parallel signcryption standard using RSA with PSEP. Project Rep., 1: 1-10.

Saxena, S. and B. Kapoor, 2014. An efficient parallel algorithm for secured data communications using RSA public key cryptography method. Proceedings of the IEEE International Conference on Advance Computing (IACC), February 21-22, 2014, IEEE, Gurgaon, India, ISBN:978-1-4799-2573-5, pp: 850-854.

Singh, P., R. Chaudhary and A. Agarwal, 2012. A novel approach of text steganography based on null spaces. IOSR. J. Comput. Eng., 3: 11-17.

Yang, C.H., C.Y. Weng, S.J. Wang and H.M. Sun, 2008. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inform. Forensics Secur., 3: 488-497.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved