Search Results - (( based application new algorithm ) OR ( _ applications ((usage algorithm) OR (rsa algorithm)) ))*
Search alternatives:
- based application »
- application new »
- _ applications »
- new algorithm »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
3
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
4
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
-
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
9
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
10
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
12
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
13
An improved public key cryptography based on the elliptic curve
Published 2002“…To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
14
-
15
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…This paper compares between various LW crypto functions in terms of their power consumption, design, complexity and memory usage. In addition, the paper highlights the need for a new one-way hash function which supports variable transformation and variable block length size to suit several applications.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
17
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
19
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023Subjects:Conference Paper -
20
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper
