Citation to this article as recorded by
Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Suitability of using symmetric key to secure multimedia data: An overview. J. Applied Sci., 10: 1656-1661. CrossRefDirect Link |
Jaberi, A., R. Ayanzadeh and A.S.Z. Mousavi, 2012. Two-layer cellular automata based cryptography. Trends Applied Sci. Res., 7: 68-77. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRefDirect Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72. CrossRefDirect Link |
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Rezai, A. and P. Keshavarzi, 2012. A New cmm-naf modular exponentiation algorithm by using a new modular multiplication algorithm. Trends Applied Sci Res., 7: 240-247. CrossRefDirect Link |
Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167. CrossRefDirect Link |
Citation to this article as recorded by
Hybrid Key Generation for RSA and ECC 2019 International Conference on Communication and Electronics Systems (ICCES) |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview Journal of Applied Sciences Vol. 10, Issue 15, 1656, 2010 |
An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael Journal of Applied Sciences Vol. 10, Issue 18, 2161, 2010 |
Firmware for Data Security: A Review Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012 |
A New CMM-NAF Modular Exponentiation Algorithm by using a New Modular Multiplication Algorithm Trends in Applied Sciences Research Vol. 7, Issue 3, 240, 2012 |
Two-layer Cellular Automata Based Cryptography Trends in Applied Sciences Research Vol. 7, Issue 1, 68, 2012 |
How to cite this article
Kefa Rabah , 2006. Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider. Journal of Applied Sciences, 6: 482-510.
DOI: 10.3923/jas.2006.482.510
URL: https://scialert.net/abstract/?doi=jas.2006.482.510
DOI: 10.3923/jas.2006.482.510
URL: https://scialert.net/abstract/?doi=jas.2006.482.510