يعرض 1 - 20 نتائج من 29 نتيجة بحث عن '(((( implement encryption algorithm ) OR ( element b algorithm ))) OR ( neural coding algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 9
  10. 10
  11. 11

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 12
  13. 13
  14. 14

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique حسب Syeda Tayyaba Bukhari (21842078)

    منشور في 2024
    "…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …"
  15. 15
  16. 16

    A Hardware Model of an Expandable RSA Cryptogrsphic System حسب Gutub, Adnan

    منشور في 1998
    "…The larger the key size is the longer the encryption/decryption time will be. To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …"
    احصل على النص الكامل
    masterThesis
  17. 17

    Hardware Model of an Expandable RSA Cryptographic System حسب Gutub, Adnan

    منشور في 1998
    "…The larger the key size is the longer the encryption/decryption time will be. To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  18. 18

    Design Feasibility Study For A 500 Gbits/s AES Cypher Decypher Engine حسب Bouhraoua, A.

    منشور في 2006
    "…A feasibility study for implementing the AES encryption algorithm in hardware achieving 500 Gbits/s is presented. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units حسب ElKassar, AbdulNasser

    منشور في 2014
    "…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20