Search Results - (( practical application rsa algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- practical application »
- implication based »
- java implication »
- application rsa »
- rsa algorithm »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
2
-
3
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
4
On (unknowingly) using near-square RSA primes
Published 2022“…The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough within the long history of secret communications. …”
Get full text
Get full text
Article -
5
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
6
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Due to small keys that had been offered by ECC, instead of RSA, ECC had been used widely in practical applications in embedded system such as mobile devices and IC card. finite field. …”
Get full text
Get full text
Student Project -
7
-
8
Practical considerations on Quantum Key Distribution (QKD)
Published 2013Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
Get full text
Get full text
Conference or Workshop Item -
11
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
Get full text
Get full text
Conference or Workshop Item -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
-
14
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis
