Search Results - (( developing variable encryption algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…This RSA co-processor core is able to encrypt and decrypt data with variable key lengths up to 4096 bits. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…In this thesis, we also develop a new cryptographic hard problem based on a special instance of a linear Diophantine equation in two variables, with some provided restrictions and carefully selected parameters. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improved scalar multiplication algorithm in affine coordinate system using elliptic net by Razali, Zuren, Muslim, Norliana, Kahar, Saliyah, Yunos, Faridah, Mohamed, Kamsiah

    Published 2022
    “…In the case of the 384-bits, results indicate that the developed scalar multiplication algorithm accelerates the running time by 65.96 % compared to the binary method, 44.81 % compared to the elliptic net without equivalent sequences, 30.28 % compared to the elliptic net with temporary variables, and 19.71 % compared to the seven blocks of the elliptic net with Karatsuba method. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…There is also a need to develop a tool that contains the three approaches where the developer can customize the protection of the source code.…”
    Get full text
    Get full text
    Thesis