A parallel distributed Javaspaces implementation of RSA public key factorization using quadratic sieve / by Lau Khek Hooi.
Similar Items
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Messaging application / Yew Hooi Phaik
by: Yew, Hooi Phaik
Published: (2001)
by: Yew, Hooi Phaik
Published: (2001)
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
Enhancement of RSA Key Generation Using Identity
by: Norhidayah, Muhammad, et al.
Published: (2015)
by: Norhidayah, Muhammad, et al.
Published: (2015)
Interactive interior design / Ee Hooi Fong
by: Ee , Hooi Fong
Published: (2000)
by: Ee , Hooi Fong
Published: (2000)
Dynamic Attendance System / Choe Kar Hooi
by: Choe, Kar Hooi
Published: (2003)
by: Choe, Kar Hooi
Published: (2003)
Partial key attack given MSBs of CRT-RSA private keys
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
RSA with flexible key size: a hardware approach
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
Persuasive techniques in internet romance scams / Tan Hooi Koon
by: Tan, Hooi Koon
Published: (2014)
by: Tan, Hooi Koon
Published: (2014)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
Concurrent factorization of RSA moduli via weak key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
A study on the sustainable development of Cameron Highlands / Chan Jin Hooi.
by: Chan, Jin Hooi
Published: (2002)
by: Chan, Jin Hooi
Published: (2002)
Accessibility for physically challenged persons in heritage buildings / Phan Meng Hooi
by: Phan, Meng Hooi
Published: (2016)
by: Phan, Meng Hooi
Published: (2016)
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
Phytochemical and biological investigations of Phyllagathis rotundifolia and Phyllagathis praetermissa / Tan Hooi Poay
by: Tan, Hooi Poay
Published: (2012)
by: Tan, Hooi Poay
Published: (2012)
Exact calculation of the flavour-changing quark-higgs vertex / Tan Bok Hooi
by: Tan, Bok Hooi
Published: (1997)
by: Tan, Bok Hooi
Published: (1997)
Glow discharge emission spectrometric analysis of compacted solids / Ng, Kim Hooi
by: Ng, Kim Hooi
Published: (1997)
by: Ng, Kim Hooi
Published: (1997)
Information technology evaluation practices among Malaysian banks / Woon, Hooi Shyen
by: Hooi Shyen, Woon
Published: (2002)
by: Hooi Shyen, Woon
Published: (2002)
Elasticity concepts and their applications / Lau Chee Eng
by: Lau, Chee Eng
Published: (1966)
by: Lau, Chee Eng
Published: (1966)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Data grid / Roseline Lau Ming Tai
by: Roseline Lau, Ming Tai
Published: (2006)
by: Roseline Lau, Ming Tai
Published: (2006)
Pola nada bahasa cina murid sekolah jenis kebangsaan cina / Hoo Sze Hooi
by: Hoo, Sze Hooi
Published: (2013)
by: Hoo, Sze Hooi
Published: (2013)
A genre-based analysis of property advertisements in a local newspaper / Choo Hooi Lan
by: Choo, Hooi Lan
Published: (1998)
by: Choo, Hooi Lan
Published: (1998)
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Types of oppositions in Malaysian preschoolers' arguments / Angelina Lau
by: Lau, Angelina
Published: (2015)
by: Lau, Angelina
Published: (2015)
Hazard identification, risk assessment and risk control (HIRARC) in a steel foundry / Lee Hooi Nee
by: Lee, Hooi Nee
Published: (2010)
by: Lee, Hooi Nee
Published: (2010)
Form-finding of surface in the form of enneper minimal surface / Hooi Min Yee and Kok Keong Choong
by: Hooi, Min Yee
Published: (2012)
by: Hooi, Min Yee
Published: (2012)
Distillation sieve tray efficiencies
by: Kalbassi, Mohammed Ali
Published: (1987)
by: Kalbassi, Mohammed Ali
Published: (1987)
Design and fabricate sieve machine
by: Mohd Effi, Mohjee
Published: (2008)
by: Mohd Effi, Mohjee
Published: (2008)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
by: Shereek, Balkees Mohamed
Published: (2016)
by: Shereek, Balkees Mohamed
Published: (2016)
Kriptosistem Multi-Rsa
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
Security issues of Novel RSA variant
by: Nitaj, Abderrahmane, et al.
Published: (2022)
by: Nitaj, Abderrahmane, et al.
Published: (2022)
Kinetic typography visual approaches as a learning aid for English intonation and word stress / Lim Chee Hooi
by: Lim , Chee Hooi
Published: (2018)
by: Lim , Chee Hooi
Published: (2018)
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
by: Md. Tap, Abu Osman, et al.
Published: (2010)
by: Md. Tap, Abu Osman, et al.
Published: (2010)
Fuzzy logic control in ATM networks / Lau Weng Tat
by: Lau, Weng Tat
Published: (1999)
by: Lau, Weng Tat
Published: (1999)
On eigenvalues of certain cayley graphs / Terry Lau Shue Chien
by: Terry, Lau Shue Chien
Published: (2016)
by: Terry, Lau Shue Chien
Published: (2016)
Lau dedicates honour to family
by: The Borneo, Post
Published: (2003)
by: The Borneo, Post
Published: (2003)
Similar Items
-
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
by: Hani, Mohamed Khalil, et al.
Published: (2000) -
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004) -
Messaging application / Yew Hooi Phaik
by: Yew, Hooi Phaik
Published: (2001) -
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011)