What is it about?

Public Key Cryptography technique

Featured Image

Why is it important?

Key generation using Pell's Equation

Perspectives

Prime Fake Modulus Principle can avoid factorization attacks of Standard RSA

Raghunandan K R
Nitte Education Trust

Read the Original

This page is a summary of: Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis, Cybernetics and Information Technologies, September 2020, De Gruyter,
DOI: 10.2478/cait-2020-0030.
You can read the full text:

Read

Contributors

The following have contributed to this page