Search Results - (( using optimization method algorithm ) OR ( _ utilization rsa algorithm ))
Search alternatives:
- method algorithm »
- utilization rsa »
- rsa algorithm »
-
1
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Also, a new point tripling formula and algorithm are introduced for elliptic curve over binary field using Lopez-Dahab projective coordinates. …”
Get full text
Get full text
Thesis -
2
Enhancing performance of global path planning for mobile robot through Alpha–Beta Guided Particle Swarm Optimization (ABGPSO) algorithm
Published 2025“…Through extensive simulations across various static environment maps, we demonstrate that the ABGPSO algorithm outperforms existing state-of-the-art optimization techniques, including Genetic Algorithms (GA), Grey Wolf Optimization (GWO), and modern optimizers like the Sine Cosine Algorithm (SCA), Harris Hawks Optimization (HHO) and Reptile search algorithm (RSA). …”
Get full text
Get full text
Get full text
Article -
3
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…Both radix-2 and radix-4 FNT modules are implemented and a further design of radix-4 FNT module, named radix-4 CTFNT module that is optimized to fit the multiplication algorithm we used is proposed. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
5
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.…”
Get full text
Get full text
Get full text
Get full text
Article -
6
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…In RSA Cryptosystem there are two completely different keys are generated, one key's utilized in encryption data and other corresponding key's utilized for decryption data. …”
Get full text
Get full text
Student Project -
7
Enhancing land cover classification in remote sensing imagery using an optimal deep learning model
Published 2023“…hyperparameter selection is accomplished with the help of the Reptile Search Algorithm (RSA). The simulation analysis was conducted upon the ISCSODL-LCC model using two benchmark datasets and the results established the superior performance of the proposed model. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
New directions in factoring the prime power RSA modulus N = prq
Published 2016“…We utilized the LLL algorithm on k Prime Power RSA public keys (Ni, ei) with Ni = prꜟqꜟ and we were able to factorize the k Prime Power RSA moduli Ni = prꜟqꜟ simultaneously in polynomial time.…”
Get full text
Get full text
Conference or Workshop Item -
9
New vulnerabilities of RSA modulus type N = p²q
Published 2016“…The proposed attacks utilizing the LLL algorithm enables one to factor the k RSA moduli Ni simultaneously.…”
Get full text
Get full text
Conference or Workshop Item -
10
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. As observed, the computational time of RSA algorithm combined with DNA coding was longer. …”
Article -
11
Concurrent factorization of RSA moduli via weak key equations
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm is a widely utilized technique in asymmetric cryptography, primarily for verifying digital signatures and encrypting messages. …”
Get full text
Get full text
Get full text
Article -
12
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The results show that the new algorithm AES-ECC-RSA (AER) was more secure than the remaining algorithms and it proved to be more secure but needed longer time to encrypt data and decrypt data.…”
Get full text
Get full text
Get full text
Thesis -
13
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004“…Theproject thus concludes with comparison of the new public key scheme based on logistic map with RSA algorithm on MATLAB platform.…”
Get full text
Get full text
Final Year Project -
14
New vulnerability of RSA modulus type N = p2q
Published 2017Get full text
Get full text
Get full text
Article -
15
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
17
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
18
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item -
19
SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE
Published 2023“…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
Get full text
Get full text
Article -
20
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
Get full text
Get full text
Thesis
