Search Results - (( simulation optimization modified algorithm ) OR ( problem implementation rsa algorithm ))
Search alternatives:
- problem implementation »
- optimization modified »
- implementation rsa »
- rsa algorithm »
-
1
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
2
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
3
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
4
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…Many innovative ideas for RSA Cryptosystem have been presented for the past two decades, and many corresponding problems remain to be resolved. …”
Get full text
Get full text
Student Project -
5
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
6
A Modified Simulated Kalman Filter Optimizer with State Measurement, Substitution Mutation, Hamming Distance Calculation, and 2-Opt Operator
Published 2021“…The simulated Kalman filter (SKF) is an algorithm for population-based optimization based on the Kalman filter framework. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Optimized clustering with modified K-means algorithm
Published 2021“…Testing on real data sets showed consistency results as the simulated ones. Generally, the proposed modified k-means algorithm is able to determine the optimum number of clusters for huge data.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A Modified Simulated Kalman Filter Optimizer with State Measurement, Substitution Mutation, Hamming Distance Calculation, and Swap Operator
Published 2021“…The modified algorithm is called Discrete Simulated Kalman Filter Optimizer (DSKFO). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Extending Pollard class of factorable RSA modulus
Published 2018“…This is a reason why implementation in key generation algorithm of RSA cryptosystem requires its primes, p and q not to be constituted by small primes. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
12
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…This study introduces a novel meta-heuristic optimization algorithm known as quasi-oppositional modified Jaya (QOMJaya) to solve different multi-objective optimal power flow (MOOPF) problems. …”
Get full text
Get full text
Get full text
Article -
13
-
14
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004“…A major problem faced in this implementation has been solved while implementing the new logistic map scheme. …”
Get full text
Get full text
Final Year Project -
15
-
16
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
17
-
18
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…In the fourth phase, the newly developed algorithm undergoes testing on the formulated ROOPs and compared to several contemporary optimizer algorithms. …”
Get full text
Get full text
Thesis -
19
Modification of the ant colony optimization algorithm for solving multi-agent task allocation problem in agricultural application
Published 2024“…In this study, Ant Colony Optimization (ACO) algorithm is employed to find the best coalition of agents. …”
Get full text
Get full text
Get full text
Article -
20
Optimal power flow using the Jaya algorithm
Published 2016“…Simulations are carried out on the modified IEEE 30-bus and IEEE 118-bus networks to determine the effectiveness of the Jaya algorithm. …”
Get full text
Get full text
Get full text
Article
