Search Results - (( data application rsa algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- data application »
- java application »
- during algorithm »
- application rsa »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
5
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
6
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…This RSA co-processor core is able to encrypt and decrypt data with variable key lengths up to 4096 bits. …”
Get full text
Get full text
Thesis -
7
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
8
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
9
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
10
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
Get full text
Get full text
Proceeding Paper -
11
-
12
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…There are many types of scheme used in encrypting a message so that it can be sent to a particular receiver from a particular sender without the third party knowing the content of the message known as cryptosystem. For example, RSA, DES (Data Encryption Standard), Symmetric Key Cryptography. …”
Get full text
Get full text
Research Reports -
14
-
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
16
-
17
Protection of the digital Holy Quran hash digest by using cryptography algorithms
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
18
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
20
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article
