Search Results - (( its implementation rsa algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- its implementation »
- implementation rsa »
- learning algorithm »
- rsa algorithm »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.…”
Get full text
Get full text
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
5
A new attack on special-structured RSA primes
Published 2019“…Finally, we present the countermeasure that can be implemented in the RSA key generation algorithm to avoid our attack.…”
Get full text
Get full text
Get full text
Article -
6
On (unknowingly) using near-square RSA primes
Published 2022“…We formulate attacks using three different algorithms to better understand their feasibility. We also provide an efficient countermeasure that it is recommended is adopted by current cryptographic libraries with RSA implementation.…”
Get full text
Get full text
Article -
7
Extending Pollard class of factorable RSA modulus
Published 2018“…This is a reason why implementation in key generation algorithm of RSA cryptosystem requires its primes, p and q not to be constituted by small primes. …”
Get full text
Get full text
Conference or Workshop Item -
8
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
9
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Newton Divided Difference Interpolation will implement into RSA Cryptography in order to secure the private key. …”
Get full text
Get full text
Book Section -
10
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004“…Athorough study on various polynomials has beenconducted and implementation on MATLAB has been done which includes conventional public key encryption scheme such as RSA algorithm. …”
Get full text
Get full text
Final Year Project -
11
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
12
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…On the other hand, an evolutionary algorithm has proven its effectiveness in searching the best feature subsets. …”
Get full text
Get full text
Get full text
Article -
13
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Furthermore the algorithm is still keeping its simplicity of non-multiplicative and nonexponentiation public-key cryptosystem. …”
Get full text
Get full text
Thesis -
14
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
16
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
17
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
18
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
Get full text
Get full text
Get full text
Article -
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis
