Search Results - (( java implication based algorithm ) OR ( value implementation rsa algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Enhancement of RSA Key Generation Using Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle

    Published 2015
    “…Therefore the Tripathi algorithm needs to be improved. Proposed algorithm called CLB-RSA has been implemented. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  3. 3

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…An exhaustive searching process of finding an optimal parameter value is another challenge. Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…All crypto protocols require the generation and use of secret values that must be unknown to attackers. Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article
  5. 5

    Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem by Bafandehkar, Mohsen

    Published 2015
    “…The objective of this research is to introduce an efficient implementation of {0,1, 3}-NAF scalar recoding algorithm by implementing block method. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Efficiency analysis for public key systems based on fractal functions. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan, M. Ahmed, Adil

    Published 2011
    “…This is used as a number of iteration to generate the fractal attractor and mask the Hutchinson operator, so that, the known attacks will not work anymore. The algorithm is implemented and compared to the classical one, to verify its efficiency and security. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Data classification based on confidentiality in virtual cloud environment by Zardari, M.A., Jung, L.T., Zakaria, M.N.B.

    Published 2014
    “…The K-Nearest Neighbour (K-NN) classifier is used for data classification and the Rivest, Shamir and Adelman (RSA) algorithm is used to encrypt sensitive data. …”
    Get full text
    Get full text
    Article
  9. 9