Search Results - (( java implication based algorithm ) OR ( using ((computing rsa) OR (computing data)) algorithm ))
Search alternatives:
- implication based »
- java implication »
- computing data »
- computing rsa »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…However, withthe emerging of grid computing architecture, it is believe that processing time to process RSA algorithm can be reduce as it use more resource together with a parallel computing element. …”
Get full text
Get full text
Final Year Project -
2
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
3
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Encryption is the one of the most secured way using prevent unauthorized access. Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
5
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
7
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
Get full text
Get full text
Thesis -
8
Modified multi prime RSA cryptosystem
Published 2018“…RSA [1] is one of the mostly used cryptosystem in securing data and information. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…As observed, the computational time of RSA algorithm combined with DNA coding was longer. …”
Article -
10
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…The tripling operation is done by computing (2P+P) using one doubling followed by one mixed addition. …”
Get full text
Get full text
Thesis -
11
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. The system is needed to be parallel as to overcome the problem of intensive computational by the RSA algorithm. …”
Get full text
Get full text
Final Year Project -
12
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
13
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
16
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013“…Encryption and decryption algorithm for secure communication depends on the algorithm while the internal structures of the robustness of the mathematics computation depend on the key it uses. …”
Get full text
Get full text
Conference or Workshop Item -
17
Protection of the digital Holy Quran hash digest by using cryptography algorithms
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
18
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The computation time analysis shows that whene doubling with remainder technique is used, the improvement of the speed rises rapidly compared to the standard implementation of the LUC algorithm and LUC algorithm with doubling rule. …”
Get full text
Get full text
Thesis -
19
Introducing S-index into factoring RSA modulus via Lucas sequences
Published 2017“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Get full text
Article -
20
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Conference or Workshop Item
