Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
1
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
-
2
-
3
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
4
-
5
-
6
-
7
-
8
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
-
10
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
11
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
12
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
-
13
-
14
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…The larger the key size is the longer the encryption/decryption time will be. To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …”
Get full text
masterThesis -
15
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…The larger the key size is the longer the encryption/decryption time will be. To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …”
Get full text
Get full text
Get full text
masterThesis -
16
Design Feasibility Study For A 500 Gbits/s AES Cypher Decypher Engine
Published 2006“…A feasibility study for implementing the AES encryption algorithm in hardware achieving 500 Gbits/s is presented. …”
Get full text
Get full text
article -
17
Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
Published 2014“…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…”
Get full text
Get full text
Get full text
article -
18
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
19
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …”
Get full text
Get full text
article -
20