بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
b algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث)
element b » elements _ (توسيع البحث), clement k (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
b algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث)
element b » elements _ (توسيع البحث), clement k (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
1
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
-
2
-
3
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022احصل على النص الكامل
article -
4
-
5
-
6
-
7
-
8
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
9
-
10
Automatic Video Summarization Using HEVC and CNN Features
منشور في 2022احصل على النص الكامل
doctoralThesis -
11
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
-
13
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
منشور في 2020احصل على النص الكامل
article -
14
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …"
-
15
-
16
A Hardware Model of an Expandable RSA Cryptogrsphic System
منشور في 1998"…The larger the key size is the longer the encryption/decryption time will be. To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …"
احصل على النص الكامل
masterThesis -
17
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…The larger the key size is the longer the encryption/decryption time will be. To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
18
Design Feasibility Study For A 500 Gbits/s AES Cypher Decypher Engine
منشور في 2006"…A feasibility study for implementing the AES encryption algorithm in hardware achieving 500 Gbits/s is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
19
Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
منشور في 2014"…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
منشور في 2021احصل على النص الكامل
doctoralThesis