• Nenhum resultado encontrado

[PDF] Top 20 EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

Has 10000 "EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C " found on our website. Below are the top 20 most common "EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C ".

EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

... novel algorithm for calculating modulo value that can process large power of numbers which otherwise are not supported by built-in data ...traditional algorithm is studied. Secondly, the parallelized ... See full document

9

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm

... CRT: RSA operations are modular exponentiations of large integers with a typical size of 512-2048 ...bits. RSA encryption generates a cipher text C from a message M based on a modular ... See full document

5

  Security Enhancement in Elliptic Curve Encryption of Amazigh alphabet using Genetic Algorithm

Security Enhancement in Elliptic Curve Encryption of Amazigh alphabet using Genetic Algorithm

... Elliptic Curve Cryptography (ECC) was introduced in 1986 by Victor Miller and Neil Koblitz as an alternative to other public key cryptosystem present such as RSA (R.Rivest and al. 1978) and ElGamal (T.Elgamal ... See full document

10

Efficient recovery algorithm for discrete valued sparse signals using an ADMM approach

Efficient recovery algorithm for discrete valued sparse signals using an ADMM approach

... struction algorithm for sparse signals whose values are taken from a discrete set, using a limited number of noisy ...proposed algorithm is capable of achieving very competitive recovery error rates ... See full document

8

A Novel Approach for Identify Small and Capital Handwritten Letter

A Novel Approach for Identify Small and Capital Handwritten Letter

... It is a symbolic level image matching technique that uses feature-based description for the character image. First, the matching regions are identified. Then, based on some well-defined ratings of the assignments, the ... See full document

5

An image encryption algorithm utilizing julia sets and hilbert curves.

An image encryption algorithm utilizing julia sets and hilbert curves.

... image encryption algorithm. The algorithm uses several parameters to generate the keys with the same size as the plain images and has a good efficiency in the ...the algorithm resist the ... See full document

9

DMAC-AN INTEGRATED ENCRYPTION SCHEME WITH RSA FOR AC TO OBSTRUCT INFERENCE ATTACKS

DMAC-AN INTEGRATED ENCRYPTION SCHEME WITH RSA FOR AC TO OBSTRUCT INFERENCE ATTACKS

... indistinguishable encryption in Randomized Arithmetic Coding(RAC) doesn’t make the system efficient because it was not encrypting the messages it ...Coding(DMAC) using dynamic session matrix to ... See full document

6

An Efficient Algorithm for Image Enhancement

An Efficient Algorithm for Image Enhancement

... To remove the impulsive noise the median filter which is one of the strong nonlinear filter for the removing the denoising power [12].However, when the noise level is over 50%, some details and edges of the original ... See full document

6

Using Genetic Algorithm for Automated Efficient Software Test Case Generation for Path Testing

Using Genetic Algorithm for Automated Efficient Software Test Case Generation for Path Testing

... The structure of this paper is organized as follows. Section 2 gives a brief introduction to Genetic Algorithms. Section 3 Basic process flow of path-oriented test data generation using GA. Section 4 describes ... See full document

5

AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES

AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES

... for encryption, we can use the EVP_EncryptInit_ex function, and for decryption we will use the EVP_DecryptionInit_ex ...actual encryption is performed by calling the EVP_EncryptUpdate ... See full document

9

Text Extraction from Live Captured Image with Diversified Background using Edge Based & K-Means Clustering

Text Extraction from Live Captured Image with Diversified Background using Edge Based & K-Means Clustering

... a text localization technique which was considered to be efficient in the difficult context of the urban ...either text or non-text ...for text extraction by analyzing the textural ... See full document

7

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... and efficient broadcasting algorithm using minimized forward node list algorithm which uses 2-hop neighborhood information more effectively to reduce redundant transmissions in asymmetric ... See full document

6

MSMET: A MODIFIED & SECURE MULTILANGUAGE ENCRYPTION TECHNIQUE

MSMET: A MODIFIED & SECURE MULTILANGUAGE ENCRYPTION TECHNIQUE

... an algorithm in Multilanguage approach, which generates different ciphertexts at different time for the same plaintext over a range of languages supported by ...cipher text than previous work on this ... See full document

4

Encryption and Decryption of Digital Image Using Color Signal

Encryption and Decryption of Digital Image Using Color Signal

... image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in ...proposed ... See full document

5

The Anatomy of a Small-Scale Document Search Engine Tool: Incorporating a new Ranking Algorithm

The Anatomy of a Small-Scale Document Search Engine Tool: Incorporating a new Ranking Algorithm

... ‘Text-Mining’. Text mining is a variation on a field called data mining and refers to the process of deriving high-quality information from unstructured ...‘Ranking Algorithm’ to rank the ... See full document

7

Improved Multispanning Tree Routing Using Efficient and Reliable Routing Algorithm for Irregular  Networks

Improved Multispanning Tree Routing Using Efficient and Reliable Routing Algorithm for Irregular Networks

... with efficient and reliable(EAR) routing. This routing algorithm is not restricted for irregular networks In EAR routes are managed based on length of the path and a weighted combinationof distance ... See full document

9

Real-time 3D rendering of water using CUDA

Real-time 3D rendering of water using CUDA

... Looking at Figs. 5.6 and 5.7, the reader may observe several details. The visual quality of both CPU and GPU-based Gauss-Seidel and Jacobi solvers is very similar. The Conjugate Gradient method, in both versions, gives ... See full document

105

A new fuzzy algorithm for ecological ranking

A new fuzzy algorithm for ecological ranking

... fuzzy algorithm, FuzRnk introduces two modifications: a) criteria can be weighted on the basis of their importance, b) not only the best performances, but also the worst ones are considered in the ranking ... See full document

3

Odd-Even Based Cryptography

Odd-Even Based Cryptography

... The encryption algorithm calculates 13 mod 2 as 1 so ...cipher text. The receiver uses the decryption algorithm to calculates 25 mod 2 as 1 so P=25-12=13(the original ... See full document

3

Text Detection in Video Using Haar Wavelet Transformation and Morphological Operator

Text Detection in Video Using Haar Wavelet Transformation and Morphological Operator

... effective algorithm for text detection and extraction in videos by applying DWT to the ...this algorithm is not sensitive to image color or intensity, uneven illumination and reflection ...This ... See full document

8

Show all 10000 documents...