Search Results - (( basic computing rsa algorithm ) OR ( evolution optimization max algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance comparison of differential evolution and particle swarm optimization in constrained optimization by Iwan, Mahmud, Akmeliawati, Rini, Faisal, Tarig, Al-Assadi, Hayder M.A.A.

    Published 2012
    “…Particle swarm optimization (PSO) and differential evolution (DE) are among the well-known modern optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
    Get full text
    Get full text
    Research Reports
  5. 5

    Simulation of quantum growing network / Ong Boon Teong by Ong , Boon Teong

    Published 2003
    “…Over the past 40 years there has been a dramatic miniaturization in computer technology. If current trends continue, by the year 2020 the basic memory components of a computer will be the size of individual atoms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…Two dynamic transmit antenna shuffling schemes, namely ‘Optimal’ and ‘Max STBC’, are proposed to enhance the V-BLAST/STBC transceiver scheme with LC-QR proposed in the first part. …”
    Get full text
    Get full text
    Thesis