Search Results - (( java simulation optimization algorithm ) OR ( _ computing rsa algorithm ))

Refine Results
  1. 1

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. The system is needed to be parallel as to overcome the problem of intensive computational by the RSA algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…One objective ofthis project is to perform a small scale study in order to set up a grid computing that can support faster computation ofRSA Algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    Introducing S-index into factoring RSA modulus via Lucas sequences by Abu, Nur Azman, Salim, Fadzilah, Kamel Ariffin, Muhammad Rezal

    Published 2017
    “…The success of factoring few large RSA modulo within the last few decades has been due to computing prowess overcoming one strong prime of RSA modulo. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A comparative S-index in factoring RSA modulus via Lucas sequences by Abu, Nur Azman, Abdul Latip, Shekh Faisal, Kamel Ariffin, Muhammad Rezal

    Published 2016
    “…The success of factoring few large RSA modulo within the last few decades has been due to computing prowess overcoming one strong prime of RSA modulo. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A RSA-type cryptosystem based on quartic polynomials by Wong, Tze Jin

    Published 2011
    “…By using this algorithm, the time for computations will be decreased. …”
    Get full text
    Get full text
    Thesis
  9. 9

    FPGA Implementation of RSA Public-Key Cryptographic Coprocessor by Hani, Mohamed Khalil, Shaikh-Husin, Nasir, Tan, Siang Lin

    Published 2000
    “…The algorithm is dependent on the computation of modular exponentials. …”
    Get full text
    Get full text
    Article
  10. 10

    Modified multi prime RSA cryptosystem by Kamardan, M. Ghazali, Aminudin, N., Che-Him, Norziha, Sufahani, Suliadi, Khalid, Kamil, Roslan, Rozaini

    Published 2018
    “…Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail by Abdul Rahim, Siti Khatijah Nor, Ismail, Siti Rozanae

    Published 2006
    “…Exponentiation is a fundamental operation that exists in most computational number theory. It is one of the dominant parts of algorithms for key exchange, electronic signatures and authentication in cryptography. …”
    Get full text
    Get full text
    Research Reports
  15. 15

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  18. 18
  19. 19

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
    Get full text
    Get full text
    Get full text
    Article