Search Results - (( java implication based algorithm ) OR ( using total rsa algorithm ))
Search alternatives:
- implication based »
- java implication »
- rsa algorithm »
-
1
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
3
On (unknowingly) using near-square RSA primes
Published 2022“…In this study, we show that use of this type of prime will potentially lead to total destruction of RSA. …”
Get full text
Get full text
Article -
4
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…In the proposed algorithm, partitioning function takes up to 74% and look up table takes up to 29% of the total elapsed time.…”
Get full text
Get full text
Thesis -
5
-
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
