Search Results - (( using based rsa algorithm ) OR ( sequence optimization method algorithm ))
Search alternatives:
- method algorithm »
- rsa algorithm »
- using based »
- based rsa »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Application of genetic algorithm method to optimize flow shop sequencing problem as the title of this project is the study about the method used in order to optimize flow shop sequencing problem. …”
Get full text
Get full text
Undergraduates Project Papers -
3
-
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
5
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
6
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
7
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
8
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…Common users of RSA cryptosystem are currently using 1024-bit keys. …”
Get full text
Get full text
Thesis -
11
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
12
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
Get full text
Get full text
Article -
13
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
Get full text
Get full text
Article -
14
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
Get full text
Get full text
Article -
15
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
Get full text
Get full text
Article -
16
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, the effect of file sizes on encryption and decryption in constrained devices have been analyzed using two types of cryptographic algorithm which is AES-128 (symmetric-key encryption) and RSA- 2048 (asymmetric-key encryption) based on the different file size, execution time, and the throughput. …”
Get full text
Get full text
Thesis -
18
Minimization of machining process sequence based on ant colony algorithm and conventional method
Published 2023“…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
Get full text
Get full text
Get full text
Article -
19
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
Get full text
Get full text
Article -
20
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
Get full text
Get full text
Article
