Search Results - (( based solution rsa algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- java application »
- based solution »
- rsa algorithm »
- solution rsa »
-
1
-
2
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
3
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
4
-
5
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…Results from the study and analysis found that AAβ cryptosystem have speeds exceeding RSA and ECC cryptosystem encryption process. While the decryption process, AAβ have speeds exceeding RSA and ECC. …”
Get full text
Get full text
Get full text
Thesis -
6
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
7
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
8
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
9
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…A comparison was made between a PRNG generator with the proposed RSA key generator and of text based watermarking in the proposed work. …”
Get full text
Get full text
Get full text
Thesis
