Search Results - (( using based rsa algorithm ) OR ( sequence optimization based algorithm ))
Search alternatives:
- rsa algorithm »
- using based »
- based rsa »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
4
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
5
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
6
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…To improve the performance of the swap sequence based PSO, this paper introduces an Enhanced Swap Sequence based PSO (Enhanced SSPSO) algorithm by integrating the strategies of the Expanded PSO (XPSO) in the swap sequence based PSO. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
8
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…Common users of RSA cryptosystem are currently using 1024-bit keys. …”
Get full text
Get full text
Thesis -
11
Comparative Analysis of Low Discrepancy Sequence-Based Initialization Approaches Using Population-Based Algorithms for Solving the Global Optimization Problems
Published 2021“…These algorithms can influence the convergence to find an efficient optimal solution. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
13
Product assembly and disassembly sequence optimization based on genetic algorithm and design for assembly methodologies
Published 2009“…In this paper, an Artificial Intelligence (AI) technique, namely Genetic Algorithm (GA) is proposed to optimize product components assembly and disassembly sequences.The proposed methodology is developed and tested on an industrial product made of plastics with no integrated assembly and permanent joint parts.GA method is applied to determine the accuracy and optimum results based on 20 assembly and disassembly sequence solutions that was generated by the Design for Assembly methodology.The results indicated that GA based approach is able to obtain a near optimal solution for assembly and disassembly sequences.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
15
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, the effect of file sizes on encryption and decryption in constrained devices have been analyzed using two types of cryptographic algorithm which is AES-128 (symmetric-key encryption) and RSA- 2048 (asymmetric-key encryption) based on the different file size, execution time, and the throughput. …”
Get full text
Get full text
Thesis -
16
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…The algorithm filtered the expected irrelevant DNA sequences in database from being computed for dynamic programming based optimal alignment process. …”
Get full text
Get full text
Get full text
Article -
17
Product assembly sequence optimization based on genetic algorithm
Published 2010“…Genetic algorithm (GA) is a search technique used in computing to find approximate solution to optimization and search problem based on the theory of natural selection. …”
Get full text
Get full text
Get full text
Article -
18
Efficient Entropy-Based Decoding Algorithms For Higher-Order Hidden Markov Model
Published 2019“…The required memory of this algorithm is also time independent. In addition, the optimal state sequence obtained by the EVRA algorithm is the same as that obtained by the classical Viterbi algorithm for HHMM.…”
Get full text
Get full text
Thesis -
19
New directions in factoring the prime power RSA modulus N = prq
Published 2016“…We utilized the LLL algorithm on k Prime Power RSA public keys (Ni, ei) with Ni = prꜟqꜟ and we were able to factorize the k Prime Power RSA moduli Ni = prꜟqꜟ simultaneously in polynomial time.…”
Get full text
Get full text
Conference or Workshop Item -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
