Search Results - (( problem solving rsa algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- rsa algorithm »
- solving rsa »
-
1
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…The securities of these models are based on the difficulties of solving multiple hard problems simultaneously. The newly algorithm will not only increase the security of system but also has high correct ability. …”
Get full text
Get full text
Student Project -
2
Introducing S-index into factoring RSA modulus via Lucas sequences
Published 2017“…In the past quarter century, factoring large RSA modulo into its primes is one of the most important and most challenging problems in computational number theory. …”
Get full text
Get full text
Get full text
Article -
3
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. At any instance in the factoring algorithm, the accumulative result stands independently. …”
Get full text
Get full text
Conference or Workshop Item -
4
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
5
Extending Pollard class of factorable RSA modulus
Published 2018“…Pollard p − 1 method is able to solve integer factorization problem if the targeted composite number has small prime factors. …”
Get full text
Get full text
Conference or Workshop Item -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
7
Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
Published 2018“…The major RSA underlying security problems rely on the difficulty of factoring a very large composite integer N into its two nontrivial prime factors of p and q in polynomial time, the ability to solve a given Diophantine equation ed = 1 + kφ (N) where only the public key e is known and the parameters d, k and φ (N) are un- known and finally the failure of an adversary to compute the decryption key d from the public key pair (e, N). …”
Get full text
Get full text
Thesis -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004“…A major problem faced in this implementation has been solved while implementing the new logistic map scheme. …”
Get full text
Get full text
Final Year Project -
9
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…The AAβ cryptosystem is constructed based on the mathematical problem of solving the Square Root Modulo and Integer Factorization problem. …”
Get full text
Get full text
Get full text
Thesis -
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
Published 2014“…It is well known that the most promising approach to solving the problem of authentication in a mobile IPv6 network is to use CGA-based authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
