Search Results - (( its application out algorithm ) OR ( its applications ((rsa algorithm) OR (based algorithm)) ))*
Search alternatives:
- its applications »
- its application »
- application out »
- out algorithm »
- rsa algorithm »
-
1
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
4
-
5
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
6
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
7
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
8
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
9
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
10
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
14
-
15
Optimal power flow using the Jaya algorithm
Published 2016“…Unlike other population-based optimization methods, no algorithm-particular controlling parameters are required for this algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Hybrid genetic manta ray foraging optimization and its application to interval type 2 fuzzy logic control of an inverted pendulum system
Published 2020“…However, this optimization algorithm can be improved in its strategy which increases its accuracy. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper -
18
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
19
-
20
