Search Results - (( developing block based algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- developing block »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
Get full text
Get full text
Get full text
Book Chapter -
7
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…The variable block matching developed based on four stages which is the video and frame selection, threshold calculation, block size selection and search pattern. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Developing triad design algorithms based on compatible factorization
Published 2011Get full text
Get full text
Get full text
Monograph -
11
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The symmetric block cipher is one of the most significant cryptographic algorithms. …”
Get full text
Get full text
Thesis -
12
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…To deal with cells of various size , the algorithm progresses by moving one cell at a time between the blocks of the partition while maintaining a desired based on the size of the blocks rather than the number of cells per block. …”
Get full text
Get full text
Thesis -
13
One-step block methods for solving ordinary and delay differential equations
Published 2011“…The algorithm which is based on the predictor-corrector scheme of Adams type was then extended from two up to six point one step block method. …”
Get full text
Get full text
Thesis -
14
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
15
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Thus the vital component of the non-parametric UCE block ciphers, that are the S-Boxes were developed. …”
Get full text
Get full text
Proceeding Paper -
16
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
17
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…They are Cross Entropy and also Genetic Algorithm. CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
18
Parallel block backward differentiation formulas for solving ordinary differential equations.
Published 2008“…A parallel block method based on Backward Differentiation Formulas (BDF) is developed for the parallel solution of stiff Ordinary Differential Equations (ODEs). …”
Get full text
Article -
19
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…This method was developed for computing the solution at four points simultaneously and the derivation based on numerical integration as well as using interpolation approach. …”
Get full text
Get full text
Get full text
Article -
20
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…To diminish the imposed distortion by data embedding in edge blocks, we employ LSB and MPC algorithms. In the proposed scheme, the blocks are split into some groups firstly. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
