Search Results - (( evolution optimization based algorithm ) OR ( using computational rsa algorithm ))
Search alternatives:
- evolution optimization »
- computational rsa »
- rsa algorithm »
-
1
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. The system is needed to be parallel as to overcome the problem of intensive computational by the RSA algorithm. …”
Get full text
Get full text
Final Year Project -
2
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
4
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
5
Introducing S-index into factoring RSA modulus via Lucas sequences
Published 2017“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Get full text
Article -
6
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Conference or Workshop Item -
7
Modified multi prime RSA cryptosystem
Published 2018“…For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
RSA algorithm performance in short messaging system exchange environment
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
10
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
11
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…Exponentiation is a fundamental operation that exists in most computational number theory. It is one of the dominant parts of algorithms for key exchange, electronic signatures and authentication in cryptography. …”
Get full text
Get full text
Research Reports -
13
-
14
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
Get full text
Get full text
Thesis -
15
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
16
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
17
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Encryption is the one of the most secured way using prevent unauthorized access. Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
18
Reliably optimal PMU placement using disparity evolution-based genetic algorithm
Published 2017“…In this paper, Disparity Evolution-type Genetic Algorithm (DEGA) based on disparity theory of evolution is applied. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A refined differential evolution algorithm for improving the performance of optimization process
Published 2011“…DE is developed based on an improved Genetic Algorithm and come with different strategies for faster optimization. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
