Search Results - (( java application optimization algorithm ) OR ( using three rsa algorithm ))
Search alternatives:
- application optimization »
- java application »
- rsa algorithm »
-
1
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
2
Modified multi prime RSA cryptosystem
Published 2018“…As in RSA, the methodology used for modified Multi-prime RSA also consists of three phases; 1. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
RSA algorithm performance in short messaging system exchange environment
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…Common users of RSA cryptosystem are currently using 1024-bit keys. …”
Get full text
Get full text
Thesis -
7
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…In this study, the Station-to-Station protocol will use three (3) prime numbers Multi-Prime RSA Digital Signature. …”
Get full text
Get full text
Student Project -
8
On (unknowingly) using near-square RSA primes
Published 2022“…We present three cases of near-square primes used as RSA primes, set in the form of (i) N=pq=(am−ra)(bm−rb); (ii) N=pq=(am+ra)(bm−rb) ; and (iii) N=pq=(am−ra)(bm+rb). …”
Get full text
Get full text
Article -
9
New directions in factoring the prime power RSA modulus N = prq
Published 2016“…We utilized the LLL algorithm on k Prime Power RSA public keys (Ni, ei) with Ni = prꜟqꜟ and we were able to factorize the k Prime Power RSA moduli Ni = prꜟqꜟ simultaneously in polynomial time.…”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The O(n) is the complexity of this algorithm. The running time is a few seconds of this algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…The cost of three scalar multiplication algorithms are compared: double-and-add, additionsubtraction and new signed-digit {0,1,3}-NAF scalar multiplication. …”
Get full text
Get full text
Thesis -
15
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
16
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010Get full text
Get full text
Proceeding Paper -
17
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
Get full text
Get full text
Thesis -
18
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
Published 2012“…We provide a benchmark by practically implementing and comparing three ciphers - AAβ, RSA and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance for varying key sizes of 128/1024/3072, 160/2048/6144 and 192/4096/12288 bits. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
20
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis
