Search Results - (( java general function algorithm ) OR ( basic computing ((rsa algorithm) OR (tree algorithm)) ))
Search alternatives:
- function algorithm »
- general function »
- basic computing »
- tree algorithm »
- rsa algorithm »
- java general »
-
1
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
6
BMTutor research design: Malay sentence parse tree visualization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…Fundamentally, the framework input is the stereo image which represents left and right images respectively. The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. …”
Get full text
Get full text
Get full text
Article -
8
Zero skew clock routing for fast clock tree generation
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
9
A Toolkit for Simulation of Desktop Grid Environment
Published 2014Get full text
Get full text
Final Year Project -
10
Petri Net Algorithm for controlling and monitoring system
Published 2009Get full text
Working Paper -
11
Real-time algorithmic music composition application.
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
Image Based Oil Palm Tree Crowns Detection
Published 2020Get full text
Get full text
Final Year Project Report / IMRAD -
14
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…© 2018 The Natural Computing Applications Forum…”
Get full text
Get full text
Article -
15
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…© 2018 The Natural Computing Applications Forum…”
Get full text
Get full text
Article -
16
Simulation of quantum growing network / Ong Boon Teong
Published 2003“…Over the past 40 years there has been a dramatic miniaturization in computer technology. If current trends continue, by the year 2020 the basic memory components of a computer will be the size of individual atoms. …”
Get full text
Get full text
Thesis -
17
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
19
A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia
Published 2018“…Hence, to ease the calculation process and improve the computational efficiency of RV coefficient, an algorithm is proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
