Search Results - (( java implementation rsa algorithm ) OR ( programming point efficient algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- programming point »
- point efficient »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING
Published 2011“…Event-driven programming method was applied in producing the maze navigation algorithm for the robot.…”
Get full text
Get full text
Final Year Project -
7
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
8
Three-point Block Algorithm For Approximating Duffing Type Differential Equations
Published 2024journal::journal article -
9
A combined filter line search and trust region method for nonlinear programming
Published 2006“…Computational results on selected large scale CUTE problems on the prototype code fiILS are very encouraging and numerical performance with LOQO and SNOPT show that the algorithm is efficient and reliable.…”
Get full text
Article -
10
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…The algorithm also shows its robustness because it does not require a good initial starting point. …”
Get full text
Get full text
Article -
11
Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias
Published 2007“…This problem can be compare by using both method of power flow, which remains well condition at the saddle node bifurcation point due to the convergence of load flow. The method of power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
12
-
13
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
14
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In order to calculate the DFT efficiently, various FFT algorithms and architectures have been presented. …”
Get full text
Get full text
Thesis -
15
Two-Point Block Variable Order Step Size Multistep Method for Solving Higher Order Ordinary Differential Equations Directly
Published 2024“…The method is subsequently programmed with a two-point block formulation which can be altered for parallel programming. …”
Article -
16
-
17
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis -
18
-
19
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
Get full text
Get full text
Get full text
Article -
20
Parallel computation of maass cusp forms using mathematica
Published 2013“…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
Get full text
Get full text
Thesis
