PRETTY GOOD PRIVACY ON ONLINE SHOPPING
Raskar, S. P. ,. P. V. P. ,. (2026). Pretty Good Privacy on Online Shopping. International Journal of Science, Strategic Management and Technology, Volume 10(01). https://doi.org/10.55041/ijsmt.v2i2.056
Raskar, Siddharth. "Pretty Good Privacy on Online Shopping." International Journal of Science, Strategic Management and Technology, vol. Volume 10, no. 01, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i2.056.
Raskar, Siddharth. "Pretty Good Privacy on Online Shopping." International Journal of Science, Strategic Management and Technology Volume 10, no. 01 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i2.056.
[2] M. I. A. H. K. S. T. S. M. H. Mohammad Rafeek Khan, Kamal Upreti and J. Parashar, “Analysis of elliptic curve cryptography rsa,” Department of Computer Science, CHRIST (Deemed to be University), Delhi NCR, Ghaziabad, India., 2023.
[3] Y. C. JUAN WANG, GE LIU and S. WANG, “Construction and analysis of sha-256 compression function based on chaos s-box,” College of Information and Communication Engineering, Harbin Engineering University, Harbin 150001, China., 2021.
[4] A. C. Anuradha Anugurala, “Securing and preventing man in middle attack in grid using open pretty good privacy (pgp),” Dept. of Computer Science and Engineering Sri Sai College of Engineering and Technology Badhani, Punjab, India., 2016.
[5] C. W. S. Z. Y. J. Z. B. Chandel, S. and T. Y. Ni, “A multi-dimensional adversary analysis of rsa and ecc in block chain encryption,” Future Information and Communication Conference Springer, Cham, pp. 988–1003., 2019.
[6] J. C. Y. Z. Y. Yang, F. Chen and K. L. Yung, “A secure hash function based on feedback iterative structure,” Enterprise Inf. Syst., vol. 13, pp. 281–302., 2019.