Search Results - (( java application optimization algorithm ) OR ( based information rsa algorithm ))
Search alternatives:
- application optimization »
- based information »
- java application »
- information rsa »
- rsa algorithm »
-
1
-
2
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
3
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
4
Comparison of ECC and RSA algorithms in IOT devices
Published 2019Get full text
Get full text
Article -
5
New directions in factoring the prime power RSA modulus N = prq
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
7
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
8
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…RSA is one public key Cryptosystem to secure information and communication from third parties and it can be factor by user authentication. …”
Get full text
Get full text
Student Project -
9
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
10
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
-
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
14
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
15
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
16
Lattice-based cryptography: the dots that provide information security
Published 2023“…Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
-
18
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…LUC cryptosystem algorithm based on the quadratic and cubic polynomial, is introduced in this thesis with a new formula to distinguishing between the cubic polynomial roots. …”
Get full text
Get full text
Thesis -
19
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
20
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports
