Search Results - (( java implications _ algorithm ) OR ( using combination rsa algorithm ))
Search alternatives:
- java implications »
- combination rsa »
- rsa algorithm »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
2
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. As observed, the computational time of RSA algorithm combined with DNA coding was longer. …”
Article -
3
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
4
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Rivest, Shamir and Adlemen Algorithm or commonly known as RSA Cryptography proposed in the year 1978 to secure confidential information. …”
Get full text
Get full text
Book Section -
5
Encryption Technology on Windows Workstation
Published 2004“…This is achieved by trying to combine several techniques of securing and strengthening the RSA algorithm. …”
Get full text
Get full text
Final Year Project -
6
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
7
Protection of the digital Holy Quran hash digest by using cryptography algorithms
Published 2013“…This paper discusses a cryptography algorithm (CARCA), which is combination between two types of cryptography (symmetric cryptography "AES" and asymmetric cryptography "RSA"). …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
9
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
10
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
Get full text
Get full text
Thesis -
11
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
Get full text
Get full text
Thesis -
12
EffectiveWatermarking of Digital Audio and Image using Matlab Technique
Published 2009“…In our proposal, for Audio Watermarking, a Watermark is encrypted using RSA Algorithm and is embedded on the audio file using LSB technique. …”
Get full text
Get full text
Book Section -
13
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…This thesis proposed a digital text based watermarking algorithm combined with Pseudo-Random Number Generator(PRNG) for cryptography application. …”
Get full text
Get full text
Get full text
Thesis -
14
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
Get full text
Get full text
Get full text
Article -
15
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
16
-
17
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
Get full text
Get full text
Get full text
Thesis -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
