نتایج جستجو برای: توانایی تکرار دوهای سرعتی rsa

تعداد نتایج: 73820  

Journal: :International journal of engineering technology and management sciences 2023

An RSA application is an program that stores Dona's remote server and delivered it over the Internet through a browser interface. They hold various tools techniques to help organizations solve problems faced in business succeed. should be kept on separate platform not tied field service software system. Recurring Service Platform where I can control our agreements safe environment. Our goal dev...

افلاطونیان, عباس, اکبری‌اسبق, فیروزه, میراحمدیان, ماهرو, هادی ندوشن, حسین,

Introduction: Recurrent spontaneous abortion (RSA) is defined as three or more consecutive miscarriages, which affects 0.8 to 1% of pregnant women. Despite several well-established etiologic factors, the cause of RSA cannot be determined in almost 60% of the cases. It has been postulated that a part of these repeated pregnancy losses might be due to immune causes. Material and Methods: In the ...

2004
Saša Radomirović

2 RSA 4 2.1 The RSA system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.2 Establishing secret communication using the RSA system . . . . . . . . . . . . . 4 2.3 Security of RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4 A very small example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.5 Factoring Record...

2017
Song Li Lei Wang Zhifang Xing Yanping Huang Zengmin Miao

OBJECTIVE This study aimed to determine the express level of tumour necrosis factor α (TNF-α) in the decidual tissue and peripheral blood of patients with recurrent spontaneous abortion (RSA). MATERIAL AND METHODS Eighty RSA patients and 100 control women were recruited in this study. Enzyme-linked immunosorbent assay (ELISA) was applied to determine the expression level of TNF-α in periphera...

Journal: :IACR Cryptology ePrint Archive 2003
Cesar Alison Monteiro Paixão

We describe an efficient combination of two variants of the RSA cryptosystem (MPrime and Rebalanced RSA) analyzed by Boneh and Shacham [Boneh and Shacham 2002]. For 2048-bit moduli, the resulting decryption process is about 8 times faster than that presented by Quisquater and Couvreur [Quisquater and Couvreur 1982] and about 27 times faster than the original cryptosystem. Resumo. Descrevemos um...

Journal: :IACR Cryptology ePrint Archive 2004
Guilin Wang Feng Bao Jianying Zhou Robert H. Deng

In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, but t − 1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite commo...

Journal: :International Journal of Computer Mathematics: Computer Systems Theory 2020

Journal: :Journal of Cryptology 2007

Journal: :Journal of Systems and Software 2009
Hung-Min Sun Mu-En Wu M. Jason Hinek Cheng-Ta Yang Vincent S. Tseng

In 1982, Quisquater and Couvreur proposed an RSA variant, called RSA-CRT, based on the Chinese Remainder Theorem to speed up RSA decryption. In 1990, Wiener suggested another RSA variant, called Rebalanced-RSA, which further speeds up RSA decryption by shifting decryption costs to encryption costs. However, this approach essentially maximizes the encryption time since the public exponent e is g...

2006
Ting-Yu Lin Hung-Min Sun

Young and Yung devised various backdoors for RSA key generation. However, due to their backdoor constructing method, the two MSBs of the modulus n generated by their systems have di¤erent distribution than that generated by the normal RSA. Thus, someone may observe the abnormal distribution of n to detect the existence of backdoors. Recently, Crepéau and Slakmon further suggested four simple wa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید