Search Results - (( java implementation using algorithm ) OR ( using three rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Modified multi prime RSA cryptosystem by Kamardan, M. Ghazali, Aminudin, N., Che-Him, Norziha, Sufahani, Suliadi, Khalid, Kamil, Roslan, Rozaini

    Published 2018
    “…As in RSA, the methodology used for modified Multi-prime RSA also consists of three phases; 1. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    A RSA-type cryptosystem based on quartic polynomials by Wong, Tze Jin

    Published 2011
    “…Common users of RSA cryptosystem are currently using 1024-bit keys. …”
    Get full text
    Get full text
    Thesis
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…In this study, the Station-to-Station protocol will use three (3) prime numbers Multi-Prime RSA Digital Signature. …”
    Get full text
    Get full text
    Student Project
  9. 9

    On (unknowingly) using near-square RSA primes by Ruzai, Wan Nur Aqlili, Abd Ghafar, Amir Hamzah, Salim, Nur Raidah, Kamel Ariffin, Muhammad Rezal

    Published 2022
    “…We present three cases of near-square primes used as RSA primes, set in the form of (i) N=pq=(am−ra)(bm−rb); (ii) N=pq=(am+ra)(bm−rb) ; and (iii) N=pq=(am−ra)(bm+rb). …”
    Get full text
    Get full text
    Article
  10. 10

    New directions in factoring the prime power RSA modulus N = prq by Shehu, Sadiq, Kamel Ariffin, Muhammad Rezal

    Published 2016
    “…We utilized the LLL algorithm on k Prime Power RSA public keys (Ni, ei) with Ni = prꜟqꜟ and we were able to factorize the k Prime Power RSA moduli Ni = prꜟqꜟ simultaneously in polynomial time.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  16. 16

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field by Md Yasin, Sharifah

    Published 2011
    “…The cost of three scalar multiplication algorithms are compared: double-and-add, additionsubtraction and new signed-digit {0,1,3}-NAF scalar multiplication. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
    Get full text
    Get full text
    Thesis
  20. 20

    AAβ public key cryptosystem - a comparative analysis against RSA and ECC by Kamel Ariffin, Muhammad Rezal, Mahad, Zahari

    Published 2012
    “…We provide a benchmark by practically implementing and comparing three ciphers - AAβ, RSA and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance for varying key sizes of 128/1024/3072, 160/2048/6144 and 192/4096/12288 bits. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item