What is it about?
Public Key Cryptography technique
Featured Image
Why is it important?
Key generation using Pell's Equation
Perspectives
Prime Fake Modulus Principle can avoid factorization attacks of Standard RSA
Raghunandan K R
Nitte Education Trust
Read the Original
This page is a summary of: Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis, Cybernetics and Information Technologies, September 2020, De Gruyter,
DOI: 10.2478/cait-2020-0030.
You can read the full text:
Contributors
The following have contributed to this page