Search Results - (( based operational rsa algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field by Md Yasin, Sharifah

    Published 2011
    “…Mathematical analysis is carried out to identify important features, advantages and disadvantages of the new signed-digit {0,1,3}-NAF scalar multiplication algorithm. Cost measurement is based on number of point operations per scalar throughout the execution of the scalar multiplication algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Elliptic curve method has shorter key size, smaller signature length, fast operations and high security working. Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Performance analysis and improvement of rabin primitive based cryptosystems by Mahad, Zahari

    Published 2014
    “…The encryption process for the AAβ cryptosystem is easy and fast as operations involved only add and multiply operations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem by Bafandehkar, Mohsen

    Published 2015
    “…The result from the input data yielded the following results: The proposed algorithm has overall 86% speed up in comparison to the base algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC) by Yunos, Faridah, Mohd Atan, Kamel Ariffin, Kamel Ariffin, Muhammad Rezal, Md. Said, Mohamad Rushdan

    Published 2014
    “…Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. For this reason, it is projected to have more practical usage than the RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Efficiency analysis for public key systems based on fractal functions. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan, M. Ahmed, Adil

    Published 2011
    “…We conclude that public key systems based on IFS transformation perform more efficiently than RSA cryptosystems in terms of key size and key space.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net by Muslim, Norliana

    Published 2022
    “…The elliptic curve cryptosystem (ECC) is applied to meet the requirement for public-key cryptosystem, mainly because ECC has shorter key lengths, and its algorithms are more efficient than Rivest-Shamir-Adleman (RSA) cryptosystem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  19. 19

    Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi by Azni, A. H., Altaf Hussain, Sakiinah, Mohd Alwi, Najwa Hayaati

    Published 2025
    “…Aimed at addressing smartphone users' authentication needs, the model operates through three phases: Registration, Digital Certificate, and Authentication, each bolstering data protection through digital certificate-based authentication. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The compression mechanism is performed using adaptive lossless compression based on Huffman encoding. Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis