Search Results - (( developing parallel encryption algorithm ) OR ( java implementation based algorithm ))
Search alternatives:
- implementation based »
- java implementation »
-
1
A parallel XTS encryption mode of operation
Published 2009“…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
Get full text
Get full text
Conference or Workshop Item -
2
Implementation of a parallel XTS encryption mode of operation
Published 2014“…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
Get full text
Get full text
Get full text
Article -
3
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
5
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
Get full text
Get full text
Conference or Workshop Item -
7
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
Get full text
Get full text
Conference or Workshop Item -
8
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
9
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
11
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
12
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…In addition AES-XTS decryption modules were also designed. Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
Get full text
Get full text
Thesis -
13
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
14
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…We started with a preliminary design of a multiplier run with typical NTT module that perform computation in parallel-in-serial-out manner before we moved into design with radix-R FNT modules that are able to compute in parallel-in-parallel-out manner for better performance. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
16
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
Get full text
Get full text
Thesis -
17
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
18
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
20
Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA
Published 2010“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Article
