Search Results - (( java simulation optimization algorithm ) OR ( _ computing rsa algorithm ))
Search alternatives:
- java simulation »
- computing rsa »
- rsa algorithm »
-
1
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. The system is needed to be parallel as to overcome the problem of intensive computational by the RSA algorithm. …”
Get full text
Get full text
Final Year Project -
2
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…One objective ofthis project is to perform a small scale study in order to set up a grid computing that can support faster computation ofRSA Algorithm. …”
Get full text
Get full text
Final Year Project -
4
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
5
RSA algorithm performance in short messaging system exchange environment
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Introducing S-index into factoring RSA modulus via Lucas sequences
Published 2017“…The success of factoring few large RSA modulo within the last few decades has been due to computing prowess overcoming one strong prime of RSA modulo. …”
Get full text
Get full text
Get full text
Article -
7
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016“…The success of factoring few large RSA modulo within the last few decades has been due to computing prowess overcoming one strong prime of RSA modulo. …”
Get full text
Get full text
Conference or Workshop Item -
8
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
9
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000“…The algorithm is dependent on the computation of modular exponentials. …”
Get full text
Get full text
Article -
10
Modified multi prime RSA cryptosystem
Published 2018“…Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
12
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
Implementation of RSA algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
14
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…Exponentiation is a fundamental operation that exists in most computational number theory. It is one of the dominant parts of algorithms for key exchange, electronic signatures and authentication in cryptography. …”
Get full text
Get full text
Research Reports -
15
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
18
-
19
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
20
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article
