Search Results - (( problem based rsa algorithm ) OR ( java application interface algorithm ))
Search alternatives:
-
1
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
2
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…The securities of these models are based on the difficulties of solving multiple hard problems simultaneously. …”
Get full text
Get full text
Student Project -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
4
New directions in factoring the prime power RSA modulus N = prq
Published 2016“…Factoring large integers is a fundamental problem in algebraic number theory and modern cryptography, which many cryptosystem such as RSA are based on. …”
Get full text
Get full text
Conference or Workshop Item -
5
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
6
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
7
Concurrent factorization of RSA moduli via weak key equations
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm is a widely utilized technique in asymmetric cryptography, primarily for verifying digital signatures and encrypting messages. …”
Get full text
Get full text
Get full text
Article -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
9
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
Get full text
Get full text
Get full text
Article -
10
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
11
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004“…Theproject thus concludes with comparison of the new public key scheme based on logistic map with RSA algorithm on MATLAB platform.…”
Get full text
Get full text
Final Year Project -
12
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
14
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
15
Lattice-based cryptography: the dots that provide information security
Published 2023“…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…The AAβ cryptosystem is constructed based on the mathematical problem of solving the Square Root Modulo and Integer Factorization problem. …”
Get full text
Get full text
Get full text
Thesis -
17
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
20
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
Published 2014“…It is well known that the most promising approach to solving the problem of authentication in a mobile IPv6 network is to use CGA-based authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
