[1] N.N.H. Adenan, M.R. Kamel Ariffin, S.H. Sapar, A.H. Abd Ghafar and M.A. Asbullah, New Jochemsz–May
cryptanalytic bound for RSA system utilizing common modulus N= p2q, Mathematics, 9 (4) 2021 340.
[2] N.A. Hassan and A.K. Farhan, Security improves in ZigBee protocol based on RSA public algorithm in WSN,
Engin. Tech. J. 37(3B) (2019) 67–73.
[3] Y. He and F. Yang, Some recurrence formulas for the Hermite polynomials and their squares, Open Math. 16(1)
(2018) 553–560.
[4] AJ. Kadhim, Expansion methods for solving linear integral equations with multiple time lags using B-spline and
orthogonal functions, Engin. Tech. J. Signif. 29(9) (2011) 1651–1661.
[5] P. Patil, P. Narayankar, D.G. Narayan and S.M.A. Meena, comprehensive evaluation of cryptographic algorithms:
DES, 3DES, AES, RSA and Blowfish, Procedia Computer Sci. 78 (2016) 617–624.
[6] A. M. S. Rahma, A. M. J. A. Hossen and O. Dawood, Public key cipher with signature based on Diffie-Hellman
and the magic square problem, Engin. Tech. J. Part (B) 34(1) (2016).
[7] Sh. A. Salman, Lattice Point and Its Application in RSA Cryptosystem, Energy Procedia 157 (2019) 39–42.
[8] R.K. Salih and M. S. Yousif, Hybrid encryption using playfair and RSA cryptosystems, Int. J. Nonlinear Anal.
Appl. 12(2) (2021) 2345–2350.
[9] R.K. Salih and M.S. Yousif, Playfair with multi strata encryption, Iraqi J. Sci. 62 (9) 2021 3237–3242.
[10] M. Thangavel, P. Varalakshmi, M. Murrali and K. Nithya, An enhanced and secured RSA key generation scheme
(ESRKGS), J. Inf. Secur. Appl. 20 (2014) 1–10.[1] N.N.H. Adenan, M.R. Kamel Ariffin, S.H. Sapar, A.H. Abd Ghafar and M.A. Asbullah, New Jochemsz–May
cryptanalytic bound for RSA system utilizing common modulus N= p2q, Mathematics, 9 (4) 2021 340.
[2] N.A. Hassan and A.K. Farhan, Security improves in ZigBee protocol based on RSA public algorithm in WSN,
Engin. Tech. J. 37(3B) (2019) 67–73.
[3] Y. He and F. Yang, Some recurrence formulas for the Hermite polynomials and their squares, Open Math. 16(1)
(2018) 553–560.
[4] AJ. Kadhim, Expansion methods for solving linear integral equations with multiple time lags using B-spline and
orthogonal functions, Engin. Tech. J. Signif. 29(9) (2011) 1651–1661.
[5] P. Patil, P. Narayankar, D.G. Narayan and S.M.A. Meena, comprehensive evaluation of cryptographic algorithms:
DES, 3DES, AES, RSA and Blowfish, Procedia Computer Sci. 78 (2016) 617–624.
[6] A. M. S. Rahma, A. M. J. A. Hossen and O. Dawood, Public key cipher with signature based on Diffie-Hellman
and the magic square problem, Engin. Tech. J. Part (B) 34(1) (2016).
[7] Sh. A. Salman, Lattice Point and Its Application in RSA Cryptosystem, Energy Procedia 157 (2019) 39–42.
[8] R.K. Salih and M. S. Yousif, Hybrid encryption using playfair and RSA cryptosystems, Int. J. Nonlinear Anal.
Appl. 12(2) (2021) 2345–2350.
[9] R.K. Salih and M.S. Yousif, Playfair with multi strata encryption, Iraqi J. Sci. 62 (9) 2021 3237–3242.
[10] M. Thangavel, P. Varalakshmi, M. Murrali and K. Nithya, An enhanced and secured RSA key generation scheme
(ESRKGS), J. Inf. Secur. Appl. 20 (2014) 1–10.