2018
DOI: 10.1088/1742-6596/978/1/012123
|View full text |Cite
|
Sign up to set email alerts
|

Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Cryptography method is one of the methods used to improve data security because it can perform the process of encryption and decryption. There are several encryption algorithms that are already open for study such as DES, AES, TwoFish, BlowFish, RC2, RC4, RC5, RSA [23], [24] (Rivest, Shamir, Adleman) and others. This study discusses the implementation of one time encryption algorithm pad and vigenere cipher to secure text messages [25], [26].…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography method is one of the methods used to improve data security because it can perform the process of encryption and decryption. There are several encryption algorithms that are already open for study such as DES, AES, TwoFish, BlowFish, RC2, RC4, RC5, RSA [23], [24] (Rivest, Shamir, Adleman) and others. This study discusses the implementation of one time encryption algorithm pad and vigenere cipher to secure text messages [25], [26].…”
Section: Introductionmentioning
confidence: 99%
“…An asymmetric algorithm is an algorithm where the encryption key used is different from the decryption key [7]- [10]. It is different from symmetric keys that use the same two keys during encryption and decryption process [11][12] [13]. The asymmetric key uses two keys, public and private key.…”
Section: Introductionmentioning
confidence: 99%
“…In this study the algorithm presented is based on converting engine problems to 2-machine problems. Based on testing and comparison with other relevant methods [19], [20], the proposed algorithm is offered as a competitive alternative to practical applications when solving n-jobs problems with m-machines. Rajendran and Ziegler (2013) [21] research was conducted to minimize the makepan in the flow shop problem using the ACO algorithm and the M-MMAS algorithm which is an additional version of the ACO algorithm.…”
Section: Introductionmentioning
confidence: 99%