Search Results - (( java implementation rsa algorithm ) OR ( _ implementation method algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Implementation of hybrid encryption method using caesar cipher algorithm by Tat Wi, Charomie

    Published 2010
    “…As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Implementation of hybrid encryption method using caesar cipher algorithm by Charomie, Tat Wi

    Published 2010
    “…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    New Quarter-Sweep-Based Accelerated Over-Relaxation Iterative Algorithms and their Parallel Implementations in Solving the 2D Poisson Equation by Rakhimov, Shukhrat

    Published 2010
    “…While all the above mentioned methods were implemented with SOR, among them, the QS point and MEG methods have never been implemented with AOR before. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…A controlled Cuk DC-DC converter was implemented and connected to a SunTech STP085B PV panel to verify the accuracy of the proposed method. …”
    Get full text
    Article
  14. 14
  15. 15

    The Implementation of Genetic Algorithm in Path Optimization by Jumali, Suriana

    Published 2005
    “…In this project, TSP will be used to model and easy visualize the path optimization problem and Genetic Algorithm (GA) was chosen to be implemented in resolving the problem. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…Hence, other contemporary processor architectures such as GPU and FPGA have become popular alternative to speed up the computation in recent years.This dissertation first discusses several existing large integer multiplication algorithms and reviews different methods used to implement thediscussed algorithms done by other researchers in both Graphic Processing Unit (GPU) and Field Programmable Gate Array (FPGA).Compared to GPU, FPGA offered more low level design and development to the implementation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  20. 20

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project