Search Results - (( evolution evaluation method algorithm ) OR ( problem implementation rsa algorithm ))
Search alternatives:
- problem implementation »
- evolution evaluation »
- implementation rsa »
- evaluation method »
- method algorithm »
- rsa algorithm »
-
1
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
2
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
3
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
4
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…Many innovative ideas for RSA Cryptosystem have been presented for the past two decades, and many corresponding problems remain to be resolved. …”
Get full text
Get full text
Student Project -
5
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
6
Extending Pollard class of factorable RSA modulus
Published 2018“…This is a reason why implementation in key generation algorithm of RSA cryptosystem requires its primes, p and q not to be constituted by small primes. …”
Get full text
Get full text
Conference or Workshop Item -
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004“…A major problem faced in this implementation has been solved while implementing the new logistic map scheme. …”
Get full text
Get full text
Final Year Project -
9
-
10
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis -
11
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
12
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
13
Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm
Published 2017“…This paper present a hybrid method of Newton method, Differential Evolution Algorithm (DE) and Cooperative Coevolution Algorithm (CCA). …”
Get full text
Get full text
Get full text
Article -
14
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
15
Multi-objective Optimization of Biochemical System Production Using an Improve Newton Competitive Differential Evolution Method
Published 2017“…Due to that, this study proposed and improved a method that comprises with Newton method, differential evolution algorithm (DE) and competitive co-evolutionary algorithm(ComCA). …”
Get full text
Get full text
Get full text
Article -
16
-
17
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…The proposed algorithm using system-level simulation experiments with performance comparison with DBWPF in terms of end-to-end delay, fairness, system throughput, Packet Loss Ratio (PLR), and spectral efficiency was evaluated. …”
Get full text
Get full text
Get full text
Thesis -
18
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The recommendation for future work is to evaluate various type of data and different type of hashing algorithm.…”
Get full text
Get full text
Thesis -
19
Parameter extraction of solar photovoltaic modules using penalty-based differential evolution
Published 2012“…The analyses carried out using synthetic current-voltage (I-V) data set showed that the proposed P-DE outperforms other Evolutionary Algorithm methods, namely the simulated annealing (SA), genetic algorithm (GA), and particle swarm optimization (PSO). …”
Get full text
Get full text
Article -
20
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
Get full text
Get full text
Thesis
