Search Results - (( using computing rsa algorithm ) OR ( software optimization path algorithm ))
Search alternatives:
- software optimization »
- optimization path »
- using computing »
- path algorithm »
- computing rsa »
- rsa algorithm »
-
1
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. The system is needed to be parallel as to overcome the problem of intensive computational by the RSA algorithm. …”
Get full text
Get full text
Final Year Project -
2
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
4
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
5
Introducing S-index into factoring RSA modulus via Lucas sequences
Published 2017“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Get full text
Article -
6
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Conference or Workshop Item -
7
Modified multi prime RSA cryptosystem
Published 2018“…For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
RSA algorithm performance in short messaging system exchange environment
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
10
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
11
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
Modeling and optimization of multi-holes drilling path using Particle Swarm Optimization
Published 2018“…Then a machining experiment has been conducted to validate the optimization results. The optimization results clearly indicated that the PSO algorithm outperformed all comparison algorithms for the drilling tool path problem. …”
Get full text
Get full text
Research Report -
13
Path planning algorithm for a car like robot based on MILP method
Published 2013“…This approach is that the path optimization can be easily solved using the CPLEX optimization software with AMPL interface / MATLAB. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System
Published 2021“…Furthermore, high-performing Ant Colony Optimization (ACO) algorithms were used to optimize the travel path time. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Optimization of drilling path using the bees algorithm
Published 2021“…This study uses the Bees Algorithm to find the best sequence of drilling holes (minimum total path length) and the results found are compared with the result of other algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Simulation of identifying shortest path walkway in library by using ant colony optimization
Published 2012Get full text
Get full text
Undergraduates Project Papers -
17
The performance effect due to varying network topologies on a software-defined network employing the k-shortest path
Published 2022“…K-shortest paths algorithm discovers a set of paths ordered in the most optimal, optimal, and suboptimal, has a very wide application is integrated into SDN controller to handle routing functionality. …”
Get full text
Get full text
Article -
18
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…Exponentiation is a fundamental operation that exists in most computational number theory. It is one of the dominant parts of algorithms for key exchange, electronic signatures and authentication in cryptography. …”
Get full text
Get full text
Research Reports -
19
Path Optimization For Cooperative Multi-Head 3d Printing
Published 2020“…The performance of the two proposed algorithms is compared against Cura, which is a commonly used software for generating the nozzle path. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
