Search Results - (( _ implication rsa algorithm ) OR ( using codification based algorithm ))*

  • Showing 1 - 2 results of 2
Refine Results
  1. 1

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…Three speech databases were used for the experiments including prolonged Malay vowels and Malay continuous speech database based on children’s speech and TIMIT database based on adult speeches. …”
    Get full text
    Get full text
    Thesis