Search Results - (( _ application new algorithm ) OR ( some applications rsa algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Security issues of Novel RSA variant by Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Adenan, Nurul Nur Hanisah, Lau, Terry Shue Chien, Che, Jiahui

    Published 2022
    “…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
    Get full text
    Get full text
    Article
  5. 5

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7
  8. 8
  9. 9

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  10. 10

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article
  11. 11

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping by Ma, Xiuqin, Hongwu, Qin

    Published 2014
    “…However, up to the present, few documents have focused on real-life applications of this algorithm. Accordingly, we apply a New Efficient Normal Parameter Reduction algorithm into real-life datasets of online shopping, such as Blackberry Mobile Phone Dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…Internet Engineering Task Force (IETF) has proposed many new technologies to cover the new real time applications which have become very important in today's Internet demands. …”
    Get full text
    Get full text
    Article
  14. 14

    Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document by Abdullah, Muhamad Taufik

    Published 2006
    “…The results show that the new stemming algorithm and approaches are superior to the previous stemming algorithm and approach. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    A new algorithm for routing and scheduling in optical omega network by Al-Shabi, Mohammed Abdulhameed Ali, Othman, Mohamed

    Published 2008
    “…In this paper, we are interested in a network called Omega Network, which has shuffle-exchange connection pattern. We propose a new algorithm called the ZeroY algorithm (ZeroY) to avoid crosstalk and route the traffic in an OM IN more efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    HISEC: a new lightweight block cipher algorithm by Alshaikhli, Imad Fakhri Taha, Mahmood Al Dabbagh, Sufyan Salim, Alahmad, Mohammad

    Published 2014
    “…In this paper, we propose a new lightweight block cipher algorithm called HISEC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper