Search Results - (( java implementation rsa algorithm ) OR ( basic using linear algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- linear algorithm »
- rsa algorithm »
- basic using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
Get full text
Get full text
Get full text
Thesis -
8
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…Two versions of the Jaya algorithm namely, the basic Jaya algorithm and novel quasi-oppositional Jaya (QOJaya) algorithm are proposed to solve different single objective OPF problems. …”
Get full text
Get full text
Thesis -
9
-
10
Path planning algorithm for a car like robot based on MILP method
Published 2013“…It is shown that this problem can be rewritten as a linear program with mixed integer / linear constraints that account for the collision avoidance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
Published 2016“…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
Get full text
Get full text
Get full text
Article -
13
-
14
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…We present a searching strategy that determines the lower bounds of SPN block ciphers structure against RDC using the Mixed Integer Linear Programming (MILP). …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Algorithm development for optimization of a refrigeration system
Published 2010“…Based on result show that decrease the pressure charge to the system will increase the cooling effect and the COP but will decrease the compressor work and the heat rejected by refrigerator system. By using the Statistica software the new algorithm was generate by using linear regression analysis and the algorithm defined as γ = 4.284109 - 0.057164 χR from the algorithm and the international domestic refrigerator using R-134a COP value, was showed that the optimum charge for the refrigerator system occur at 31.21psi.R…”
Get full text
Get full text
Undergraduates Project Papers -
20
