RSA
11 Followers
Recent papers in RSA
Fondé sur une enquête ethnographique et sur des données quantitatives, cet article traite de la construction sociale du rapport à l’emploi chez des mères seules allocataires du Revenu de solidarité active. Celles-ci peuvent avoir du mal à... more
En este documento se explorará el método de factorización de números semiprimos a través del método de Conjuntos de Parábolas Concéntricas (𝐶𝑃𝐶). El documento realiza un análisis de datos a partir de varios conceptos iniciales, y va... more
En 2011, le rapport du Comité national d'évaluation du RSA (CNE) estime que 49% de bénéficiaires potentiels du RSA ne le demandent pas : 35% pour le RSA socle et 68% pour le RSA activité. On constate donc un important taux de non-recours... more
C'est un Mini-projet, que nous avons implémenté les algorithmes du chiffrement pour RSA. Nous avons dû travailler sur la conception d'une interface, en utilisant le langage de Programmation JAVA.
Cloud database are derivatives of Cloud computing. At present, most medical institutions store data in cloud database. Although the cloud database improves the efficiency of use, it also poses a huge impact and challenge to the secure... more
Due to the rapid growth of online transactions on the Internet, authentication, non-repudiation and integrity are very essential security requirements for a secure transaction. To achieve these security goals, digital signature is the... more
Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost... more
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
This paper reports about the survey of various techniques available in an encryption and also in compression technique. It is mainly analyzing the existing encoding and compressed cryptosystem together as a literature survey. It is also... more
To overcome the problems faced in symmetric key algorithms, people have chosen Asymmetric Key algorithms for communication. Communication with Asymmetric algorithms will give us transmission of information without exchanging the key.... more
Cryptography is derived from a Greek word which means the art of protecting information by converting it into an unreadable format. In order to prevent some unwanted users or people to get access to the data cryptography is needed. RSA is... more
Questo lavoro è diviso in due parti. Nella prima vi è uno studio dei concetti di privacy by design e by default introdotti col GDPR. Viene presentato uno strumento (questionario) in grado di analizzare la compliance al regolamento e... more
This report resumes my 6 months end-of-studies internship at Alcatel-Lucent International as an Ethical Hacker for connected objects in the Device IOT Excellence Center. It begins with briefly describing Alcatel-Lucent, its history,... more
Coba fikirkan hal apa yang tidak dapat diretas hari ini ? Apakah demikian juga halnya dahulu ? apakah esok dan masa depan kita masih akan terus mengalami semua kekacauan ini ? Coba jawab dalam diri anda berapa banyak informasi yang anda... more
Odin Hjemdal, Antonio Roazzi, Maria da Graça B. B. Dias and Oddgeir Friborg Abstract Background: The resilience construct is of increasing interest in clinical and health psychology. The Resilience Scale for Adults (RSA) is a measure of... more
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three... more
In current scenario everything is being transferred on the web and other communication medium. So that we need to make our data secure from all other attacker and unauthorized person. So that we have to give lot of protection to the... more
Passwordless Login for Web Application' is an android application, will be used to access online internet accounts of distinct web applications and web services. The user would register with prerequisite credentials primarily like, an... more
The following document will be overlooking the research carried out to develop a sales management system that will implement high end RSA encryption. The report consists of all the research carried out into the field of cybersecurity and... more
Kryptografie je velmi důležitým aspektem našeho každodenního života, protože poskytuje teoretický základ informační bezpečnosti. Kvantové výpočty a informace se také stávají velmi důležitou oblastí vědy kvůli mnoha aplikačním oblastem... more
Public Key Infrastructure gives security limits on the association, for instance, encryption of data, an insistence that data are done and customer affirmation, by open key encryption, etc. PKI starts to be worked as a validation base on... more
Medical image security provides challenges and opportunities, watermarking and encryption of medical images provides the necessary control over the flow of medical information. In this paper a dual security approach is employed .A medical... more
In this era of rapid technological development, critical prescriptive documents and personality information have begun to be stored in digital media. Increasing the importance of stored information has led to the development of security... more
In this paper, we consider an RSA modulus N=pq, where the prime factors p, q are of the same size. We present an attack on RSA when the decryption exponent d is in the form d=Md1+d0 where M is a given positive integer and d1 and d0 are... more
Sending a message is an activity who use by everyone for a day now. But we a citizen must beware of message spy without permission or tap a message content while a message inside a process sending from cellular owner who has that message.... more
En este documento se pretende realizar un criptoanálisis (podríamos decir “una prueba de resistencia”) al sistema de cifrado RSA. Se empieza por definir cómo funciona el algoritmo a nivel funcional, y cómo funciona a nivel técnico. Una... more
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is... more
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
Cryptography plays an important role for data security and integrity and is widely adopted, especially in embedded systems. On one hand, we want to reduce the computation overhead of cryptography algorithms; on the other hand, we also... more
Le discours sur la « fraude sociale » a marqué le quinquennat de Nicolas Sarkozy. Prétextant sauver la protection sociale des assistés et des tricheurs, ce discours a répandu l'idée que les droits économiques et sociaux se méritent et a... more
Cryptography is an art to manipulate a private message, especially for state security. One of the known methods to strengthen the secureness of a cryptography is by combining two existing cryptographies. A combination of two... more
The aim of this study is to investigate the bodily-self in Restrictive Anorexia, focusing on two basic aspects related to the bodily self: autonomic strategies in social behavior, in which others' social desirability features, and social... more
Due to their use in daily life situation, demand for remote health applications and e-health monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy, information can be transferred from the patient to the... more
Data Security is the most important issue nowadays. A lot of cryptosystems are introduced to provide security. Public key cryptosystems are the most common cryptosystems used for securing data communication. The common drawback of... more
Smart cards improve the convenience and security of any transaction. They provide tamper-proof storage of user and account identity. Multifunction cards are used to manage network system access, store value and other data. The cards carry... more
The computational fundament of most public-key cryptosystems is the modular multiplication. Improving the efficiency of the modular multiplication is directly associated with the efficiency of the whole cryptosystem. This paper presents... more
Childhood adversity (CA) is strongly associated with youth psychopathology. Identifying factors that reduce vulnerability following CA is critical for developing preventive interventions. Vagal tone and vagal reactivity following... more
Pertukaran dokumen elektronik melalui jaringan publik global atau Internet menggunakan fasilitas email sudah luas digunakan sebagai transaksi komersial. Untuk menjamin dokumen elektronik tersebut masih utuh/otentik/tidak mengalami... more
SPI 2014: nº 1. Pietro Bembo (1470-1547) nació en Venecia en el seno de una familia perteneciente a la aristocracia. Su padre, prestigioso diplomático, bibliófilo y coleccionista de arte, mantuvo estrecho contacto con figuras destacadas... more