Search Results - (( _ application a algorithm ) OR ( some application rsa algorithm ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Security issues of Novel RSA variant by Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Adenan, Nurul Nur Hanisah, Lau, Terry Shue Chien, Che, Jiahui

    Published 2022
    “…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article
  8. 8

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…Greedy algorithms expresses as a simple solution algorithm that choose a local optimum solution at each step to achieve a global optimum. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…This paper presents a novel technique consisting of both TOPSIS and game theory algorithms to study three smart grid applications. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…Basically, this algorithm is a combination of iterative algorithm with adaptive algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…The application involves the reduction of a traffic noise that affects the pressure field in a bedroom. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review by Omar, M.B., Bingi, K., Rajanarayan Prusty, B., Ibrahim, R.

    Published 2022
    “…A detailed description of different spiral paths, their characteristics, and the application of these spiral approaches in developing and improving other optimization algorithms are comprehensively presented. …”
    Get full text
    Get full text
    Article
  18. 18

    Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review by Omar, M.B., Bingi, K., Rajanarayan Prusty, B., Ibrahim, R.

    Published 2022
    “…A detailed description of different spiral paths, their characteristics, and the application of these spiral approaches in developing and improving other optimization algorithms are comprehensively presented. …”
    Get full text
    Get full text
    Article
  19. 19

    Comprehensive review of the development of the harmony search algorithm and its applications by Al-Omoush, A.A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A simulation based fly optimisation algorithm for swarms of mini autonomous surface vehicles application by Zainal Abidin, Zulkifli

    Published 2011
    “…Present paper intends to provide a detailed description of a new bio-inspired Metaheuristic Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article