Search Results - (( using optimization method algorithm ) OR ( using computer rsa algorithm ))*
Search alternatives:
- method algorithm »
- rsa algorithm »
- computer rsa »
-
1
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…The tripling cost is (12M+7S) which is cheaper than the cost of computing (2P+P) using traditional method. The new tripling formula saved (2M+2S) when compared with the traditional method. …”
Get full text
Get full text
Thesis -
2
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
3
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…Both radix-2 and radix-4 FNT modules are implemented and a further design of radix-4 FNT module, named radix-4 CTFNT module that is optimized to fit the multiplication algorithm we used is proposed. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. The system is needed to be parallel as to overcome the problem of intensive computational by the RSA algorithm. …”
Get full text
Get full text
Final Year Project -
5
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
7
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
8
Introducing S-index into factoring RSA modulus via Lucas sequences
Published 2017“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Get full text
Article -
9
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Conference or Workshop Item -
10
Modified multi prime RSA cryptosystem
Published 2018“…For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
RSA algorithm performance in short messaging system exchange environment
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
13
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…Exponentiation is a fundamental operation that exists in most computational number theory. It is one of the dominant parts of algorithms for key exchange, electronic signatures and authentication in cryptography. …”
Get full text
Get full text
Research Reports -
16
-
17
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
Get full text
Get full text
Thesis -
18
Enhancing land cover classification in remote sensing imagery using an optimal deep learning model
Published 2023“…hyperparameter selection is accomplished with the help of the Reptile Search Algorithm (RSA). The simulation analysis was conducted upon the ISCSODL-LCC model using two benchmark datasets and the results established the superior performance of the proposed model. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
20
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis
