Search Results - (( java implication force algorithm ) OR ( its implementation rsa algorithm ))
Search alternatives:
- its implementation »
- implementation rsa »
- implication force »
- java implication »
- force algorithm »
- rsa algorithm »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.…”
Get full text
Get full text
Get full text
Get full text
Article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
5
A new attack on special-structured RSA primes
Published 2019“…Finally, we present the countermeasure that can be implemented in the RSA key generation algorithm to avoid our attack.…”
Get full text
Get full text
Get full text
Article -
6
On (unknowingly) using near-square RSA primes
Published 2022“…We formulate attacks using three different algorithms to better understand their feasibility. We also provide an efficient countermeasure that it is recommended is adopted by current cryptographic libraries with RSA implementation.…”
Get full text
Get full text
Article -
7
Extending Pollard class of factorable RSA modulus
Published 2018“…This is a reason why implementation in key generation algorithm of RSA cryptosystem requires its primes, p and q not to be constituted by small primes. …”
Get full text
Get full text
Conference or Workshop Item -
8
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Newton Divided Difference Interpolation will implement into RSA Cryptography in order to secure the private key. …”
Get full text
Get full text
Book Section -
9
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004“…Athorough study on various polynomials has beenconducted and implementation on MATLAB has been done which includes conventional public key encryption scheme such as RSA algorithm. …”
Get full text
Get full text
Final Year Project -
10
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
11
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…On the other hand, an evolutionary algorithm has proven its effectiveness in searching the best feature subsets. …”
Get full text
Get full text
Get full text
Article -
12
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Furthermore the algorithm is still keeping its simplicity of non-multiplicative and nonexponentiation public-key cryptosystem. …”
Get full text
Get full text
Thesis -
13
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
14
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
Get full text
Get full text
Get full text
Article -
16
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…Elliptic curve cryptosystem (ECC) is being used nowadays more than ever to fulfill the need for public key cryptosystem because of its ability to use shorter keys lengths and computationally more efficient algorithms than anther public key cryptosystems such as Rivest-Shamir- Adleman (RSA), Digital Signature Algorithm (DSA) and ElGamal. …”
Get full text
Get full text
Get full text
Thesis -
17
Efficiency analysis for public key systems based on fractal functions.
Published 2011“…This is used as a number of iteration to generate the fractal attractor and mask the Hutchinson operator, so that, the known attacks will not work anymore. The algorithm is implemented and compared to the classical one, to verify its efficiency and security. …”
Get full text
Get full text
Get full text
Article -
18
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…To assess the model, expert reviews are conducted to ensure its effectiveness. The results demonstrate significant improvements in security and ease of implementation compared to traditional authentication methods. …”
Get full text
Get full text
Get full text
Article
