Search Results - (( developing implementation encryption algorithm ) OR ( java applications rsa algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Implementation of a parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2014
    “…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA) by Mohd Nazlee, Anas, Hussin, Fawnizu Azmadi, Zain Ali, Noohul Basheer

    Published 2010
    “…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA) by Mohd Nazlee, Anas, Hussin, Fawnizu Azmadi, Zain Ali, Noohul Basheer

    Published 2010
    “…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2009
    “…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin by Saifuddin, Nur Fattin Nadhrah

    Published 2018
    “…Besides, this encryption using audio as a data in order to design and develop the project. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…Therefore, hopefully in future, any cryptography developers can implement this code if they want to encrypt the complex data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Design and Implementation of Advanced Encryption Standard Using Verilog HDL by Shamsiah, Suhaili, Rene Brooke, Fredrick, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Design and implementation of advanced encryption standard using verilog HDL by Shamsiah, Suhaili, Fredrick, Rene Brooke, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2022
    “…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Data hiding in medical images using encryption and steganography techniques by Nur Athirah, Abdul Razak

    Published 2019
    “…In this paper, for the sender side, the secret text will be encrypted using Advanced Encryption Standard algorithm and embedded into the chosen cover image using Least Significant Bit algorithm for more security. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20