Search Results - (( _ application new algorithm ) OR ( some application ((use algorithm) OR (rsa algorithm)) ))
Search alternatives:
- some application »
- application new »
- new algorithm »
- use algorithm »
- rsa algorithm »
-
1
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
5
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
6
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
7
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
8
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
9
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
10
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
11
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
12
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
13
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
14
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
15
-
16
A new stepsize for gradient method via weak secant equation
Published 2007Get full text
Conference or Workshop Item -
17
The fusion of particle swarm optimization (PSO) and interior point method (IPM) as cooperative movement control algorithm in Swarm Robotics / Dada Emmanuel Gbenga
Published 2016“…Secondly, we compared the performance of our new algorithm pdAPSO with APSO, and PSO using 7 benchmark functions. …”
Get full text
Get full text
Thesis -
18
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
19
-
20
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article
