Search Results - (( java application using algorithm ) OR ( based operations rsa algorithm ))
Search alternatives:
- java application »
- based operations »
- using algorithm »
- operations rsa »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
3
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Mathematical analysis is carried out to identify important features, advantages and disadvantages of the new signed-digit {0,1,3}-NAF scalar multiplication algorithm. Cost measurement is based on number of point operations per scalar throughout the execution of the scalar multiplication algorithm. …”
Get full text
Get full text
Thesis -
4
-
5
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Elliptic curve method has shorter key size, smaller signature length, fast operations and high security working. Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
6
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
7
-
8
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…The encryption process for the AAβ cryptosystem is easy and fast as operations involved only add and multiply operations. …”
Get full text
Get full text
Get full text
Thesis -
9
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
10
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…The result from the input data yielded the following results: The proposed algorithm has overall 86% speed up in comparison to the base algorithm. …”
Get full text
Get full text
Thesis -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
-
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
16
A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC)
Published 2014“…Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. For this reason, it is projected to have more practical usage than the RSA. …”
Get full text
Get full text
Get full text
Article -
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
