Search Results - (( based computing ((rsa algorithm) OR (bee algorithm)) ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- based computing »
- rsa algorithm »
- bee algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
3
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
4
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
5
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000“…The algorithm is dependent on the computation of modular exponentials. …”
Get full text
Get full text
Article -
6
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
7
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
Published 2012“…The other downside of the Bee Algorithm is that it has needless computation. …”
Get full text
Get full text
Get full text
Thesis -
11
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…As observed, the computational time of RSA algorithm combined with DNA coding was longer. …”
Article -
12
-
13
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
14
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The main objective of this research is to develop a computer program with capability of manipulating the onlooker bee approaches in ABC Algorithm for solving flowshop scheduling problem. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
-
17
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
18
Honey bee based trust management system for cloud computing
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
19
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…This technique can find out the 3.851273 bits per base of the compression rate. The O(n) is the complexity of this algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Global gbest guided-artificial bee colony algorithm for numerical function optimization
Published 2018“…Recently, an attractive bio-inspired method—namely the Artificial Bee Colony (ABC)—has shown outstanding performance with some typical computational algorithms in different complex problems. …”
Get full text
Get full text
Article
