Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/14675
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRathod U.
dc.contributor.authorSreenivas S.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:15:39Z-
dc.date.available2021-05-05T10:15:39Z-
dc.date.issued2021
dc.identifier.citationLecture Notes in Electrical Engineering , Vol. 698 , , p. 139 - 149en_US
dc.identifier.urihttps://doi.org/10.1007/978-981-15-7961-5_14
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/14675-
dc.description.abstractRSA Public Key Cryptography (PKC) otherwise called asymmetric encryption, comprises of two keys known as public key and private key. While the sender utilizes receiver’s public key to encrypt the message, the receiver’s private key is utilized for decrypting the message, so there is no compelling reason to share a private key as in symmetric cryptography which requires sharing a private key. This paper means to investigate RSA and its variants, study its qualities and shortcomings, and propose inventive answers for conquer the shortcoming. RSA is extraordinary compared to other asymmetric key cryptographic algorithms in correspondence over systems. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.en_US
dc.titleComparative Study Between RSA Algorithm and Its Variants: Inception to Dateen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.