Search Results - (( its application testing algorithm ) OR ( some applications rsa algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- some applications »
- applications rsa »
- its application »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
4
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
5
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
7
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
8
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
9
A multi-objective Spiral Dynamic algorithm and its application for PD design
Published 2017“…In terms of its application in solving a real problem, both algorithms successfully optimize the PD and control the system very well. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
11
Hybrid genetic manta ray foraging optimization and its application to interval type 2 fuzzy logic control of an inverted pendulum system
Published 2020“…To test the algorithm with a real application, the algorithms were applied to an interval type 2 fuzzy logic controller (IT2FLC) of an inverted pendulum system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Comparative analysis of sine cosine and social network search-based algorithm for software test redundancy reduction optimization
Published 2024“…More precisely, our work intents to investigate the algorithms' performance in terms of test reduction percentage and execution time. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Reduced Galloping Column Algorithm For Memory Testing
Published 2015Get full text
Get full text
Thesis -
15
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
16
Artificial Bee Colony Algorithm for Pairwise Test Generation
Published 2017“…In a case where PABC is not at its optimal stage or its best performance, the experiments of a test case are effectively competitive. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Pairwise Test Data Generation based on Flower Pollination Algorithm
Published 2017“…Currently, researches on Flower Pollination Algorithm (FPA) are very active and its applications have been proven successes to solve many problems. …”
Get full text
Get full text
Get full text
Article -
19
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
Get full text
Get full text
Thesis -
20
