Search Results - (( based ((computing rsa) OR (computing data)) algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- computing data »
- computing rsa »
-
1
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000“…The algorithm is dependent on the computation of modular exponentials. …”
Get full text
Get full text
Article -
2
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
4
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…As observed, the computational time of RSA algorithm combined with DNA coding was longer. …”
Article -
5
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Mathematical analysis is carried out to identify important features, advantages and disadvantages of the new signed-digit {0,1,3}-NAF scalar multiplication algorithm. Cost measurement is based on number of point operations per scalar throughout the execution of the scalar multiplication algorithm. …”
Get full text
Get full text
Thesis -
6
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
7
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
10
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Thus the authenticity and privacy of the information transmitted and the data stored on networked computers is of utmost importance. …”
Get full text
Get full text
Thesis -
11
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
12
-
13
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
14
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
15
-
16
-
17
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
