Search Results - (( java implementation rsa algorithm ) OR ( using function design algorithms ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    OPTIMAL DESIGN OF A BLDC MOTOR BY GENETIC ALGORITHM by OTHMAN, AZRUL HISHAM

    Published 2007
    “…The project report describes an optimal design of Brushless DC (BLDC) motor using Genetic Algorithm (GA) and Simulated Annealing (SA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Design of low order quantitative feedback theory and H-infinity-based controllers using particle swarm optimisation for a pneumatic actuator system by Ali, Hazem I.

    Published 2010
    “…The PSO algorithm is used to minimize the infinity norm of the transfer function of the nominal closed loop system to obtain the optimal parameters of the weighting functions. …”
    Get full text
    Get full text
    Thesis
  11. 11

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL by Sharifah Azizah, Wan Alwi

    Published 2022
    “…Basically, it is used for message digest. RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…In the previous Intel Microelectronic SHA-3 design, the synthesized area of the design is large due to many intermediate states and logics of the step mapping functions. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application by SHAMSIAH BINTI, SUHAILI

    Published 2025
    “…The main objective of this research is to formulate unfolding transformation factor 2 and factor 4 methods into hash function design. Additionally, low-power design techniques using state encoding in hash function design also need to be considered. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  17. 17

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  18. 18
  19. 19

    Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah by Hanafiah, Sukri

    Published 1997
    “…The objective of this project is to build Optimal Layout of CMOS Functional Arrays 1C standard cell design. Firstly, this report is discussed about the Optimal Layout of CMOS Functional of CMOS functional array. …”
    Get full text
    Get full text
    Thesis
  20. 20

    DESIGN OF IMPROVED GRID FOR TURTLE ROBOT by Adnan, Muhammad Zulhilmi

    Published 2013
    “…This is the followed by developing improved grid design with new algorithm which is then tested continuously to ensure its functionality working flawlessly. …”
    Get full text
    Get full text
    Final Year Project