Academic literature on the topic 'Algorytm ElGamala'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Algorytm ElGamala.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Algorytm ElGamala"

1

Zakaria, M. Nanak, Yoyok Heru Prasetyo Isnomo, Junaedi Adi Prasetyo, and Dwinnar Rosyidan. "Implementasi algoritma elgamal untuk pengamanan data pada wireless sensor network." JURNAL ELTEK 23, no. 1 (2025): 24–31. https://doi.org/10.33795/eltek.v23i1.6910.

Full text
Abstract:
Perkembangan teknologi informasi menimbulkan tantangan keamanan data, terutama pada Wireless Sensor Network (WSN) yang rentan terhadap penyadapan. LoRa (Long Range) sering digunakan dalam WSN, tetapi memiliki kelemahan dalam keamanan komunikasi antar node. Untuk mengatasi hal ini, diperlukan sistem autentikasi yang kuat, seperti manajemen kunci. Algoritma ElGamal dipilih karena keamanannya berbasis logaritma diskret dan fleksibilitasnya dalam pengaturan ukuran kunci. Penelitian ini mengimplementasikan Algoritma ElGamal pada WSN dengan LoRa sebagai media transmisi. Perangkat yang digunakan adal
APA, Harvard, Vancouver, ISO, and other styles
2

Andrian, Yudhi. "Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci." Creative Information Technology Journal 1, no. 3 (2015): 194. http://dx.doi.org/10.24076/citec.2014v1i3.21.

Full text
Abstract:
Algoritma ElGamal merupakan algoritma dalam kriptografi yang termasuk dalam kategori algoritma asimetris. Keamanan algoritma ElGamal terletak pada kesulitan penghitungan logaritma diskret pada bilangan modulo prima yang besar sehingga upaya untuk menyelesaikan masalah logaritma ini menjadi sangat sukar. Algoritma ElGamal terdiri dari tiga proses, yaitu proses pembentukan kunci, proses enkripsi dan proses dekripsi. Proses pembentukan kunci kriptografi ElGamal terdiri dari pembentukan kunci privat dan pembentukan kunci public. Pada proses ini dibutuhkan sebuah bilangan prima aman yang digunakan
APA, Harvard, Vancouver, ISO, and other styles
3

Sidik, Agung Purnomo. "Algoritma Hybrid dengan Kombinasi Elgamal Algorithm dan Electronic Code Book untuk Mengatasi Masalah Key Distribution." JURNAL UNITEK 15, no. 2 (2022): 114–22. http://dx.doi.org/10.52072/unitek.v15i2.309.

Full text
Abstract:
Tujuan dari penelitian ini adalah mengombinasikan algoritma kunci publik Elgamal dengan model operasi Electronic Code Book (ECB) untuk menghasilkan algoritma yang cepat dan aman yang terbebas dari masalah key distribution. Masalah key distribution terjadi dikarenakan adanya proses pengiriman kunci rahasia dalam jaringan publik. Model operasi Electronic Code Book (ECB) digunakan untuk proses enkripsi dengan panjang blok 128-bit. Algoritma Elgamal digunakan untuk mengenkripsi kunci simetris 128-bit yang berbentuk acak untuk menghasilkan cipher key yang bersifat publik atau tidak rahasia. Hasil p
APA, Harvard, Vancouver, ISO, and other styles
4

Hamdani, Hamdani, Nurika Rahmadani, Zainal Arifin, and Refi Riduan Achmad. "Analisis Perbandingan Performa Algoritma Asimetris Elgamal Dan Merkle-Hellman-Knapsack Pada Pesan Teks." Jurnal Informatika Komputer, Bisnis dan Manajemen 23, no. 1 (2025): 48–55. https://doi.org/10.61805/fahma.v23i1.158.

Full text
Abstract:
Perkembangan algoritma kriptografi ditandai dengan beragamnya jenis-jenis algoritma kriptografi yang dapat digunakan dalam enkripsi dan dekripsi, seperti algoritma Elgamal dan Merkle-Hellman-Knapsack. Algoritma Elgamal didasarkan pada logaritma diskrit, sedangkan algoritma Merkle-Hellman-Knapsack didasarkan pada kurva aljabar eliptik. Penelitian ini bertujuan untuk mengetahui perbandingan performa algoritma Elgamal dan Merkle-Hellman-Knapsack dalam melakukan enkripsi dan dekripsi pesan teks. Analisis perbandingan dalam penelitian ini dilakukan dengan mengukur beberapa parameter, yaitu pengguna
APA, Harvard, Vancouver, ISO, and other styles
5

Neyman, Shelvie, and Selfi Qisthina. "Pengamanan Internet of Things untuk Tanda Tangan Digital Menggunakan Algoritme Elgamal Signature Scheme." Jurnal Ilmu Komputer dan Agri-Informatika 8, no. 1 (2021): 69–78. http://dx.doi.org/10.29244/jika.8.1.69-78.

Full text
Abstract:
Internet of Things (IoT) memungkinkan suatu objek menghasilkan data dan bertukar data. Pengaplikasian IoT menggunakan mikrokontroler seperti Arduino belum memiliki fitur untuk menjaga keamanan data di dalamnya. Selain itu, Arduino memiliki kapabilitas komputasi terbatas. Oleh karena itu, perlu diterapkan kriptografi dengan algoritme yang memiliki komputasi rendah pada Arduino untuk menjaga keamanan data. Penjagaan keamanan data terutama pada keaslian asal data, dilakukan dengan menggunakan tanda tangan digital. Penerapan tanda tangan digital dapat dilakukan salah satunya dengan algoritme Elgam
APA, Harvard, Vancouver, ISO, and other styles
6

Fauzi, Achmad, Yani Maulita, and Novriyenni Novriyenni. "PERANCANGAN APLIKASI KEAMANAN PESAN MENGGUNAKAN ALGORITMA ELGAMAL DENGAN MEMANFAATKAN ALGORITMA ONE TIME PAD SEBAGAI PEMBANGKIT KUNCI." JTIK (Jurnal Teknik Informatika Kaputama) 1, no. 1 (2017): 1–9. http://dx.doi.org/10.59697/jtik.v1i1.680.

Full text
Abstract:
Pengamanan pesan diperlukan dalam rangka untuk mencegah pesan yang didistribusikan dapat dibuka oleh pihak lain yang tidak berkepentingan di mana pada akhirnya dapat mengancam kemanan dan kenyamanan dari si pengirim maupun penerima pesan tersebut. Untuk mengamankan pesan tersebut dalam dilakukan penerapan ilmu kriptografi yang bertujuan untuk mengubah pesan asli (plaintext) menjadi pesan terenkripsi (ciphertext), di mana untuk membukapesan tersebut memerlukan kunci.Algoritma One Time Paddikenal dengan nama holygrail algorithm dikarenakan algoritma kriptografi One Time Pad adalah algoritma yang
APA, Harvard, Vancouver, ISO, and other styles
7

Ludyawati, Ludyawati, Muhammad Khudzaifah, and Erna Herawati. "Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia." Jurnal Riset Mahasiswa Matematika 2, no. 6 (2023): 247–56. http://dx.doi.org/10.18860/jrmm.v2i6.22041.

Full text
Abstract:
Vigènere Cipher is a symmetric cryptographic algorithm that uses the same type of key in the encryption and decryption process. The security of the Vigènere Cipher method lies in the modulo calculation used. ElGamal is an asymmetric cryptographic algorithm that uses two different types of keys in the encryption and decryption process. The security of the ElGamal algorithm lies in the complexity of calculating large prime numbers. The Vigènere Cipher and ElGamal have their advantages and disadvantages. The researchers are interested in combining the advantages of the two methods. In this study,
APA, Harvard, Vancouver, ISO, and other styles
8

Khairani, Khairani, and Mhd Zulfansyuri Siambaton. "Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker." sudo Jurnal Teknik Informatika 2, no. 4 (2023): 176–87. http://dx.doi.org/10.56211/sudo.v2i4.401.

Full text
Abstract:
Keamanan data merupakan hal yang sangat penting dalam menjaga kerahasiaan informasi terutama yang berisi informasi sensitif yang hanya boleh diketahui isinya oleh pihak yang berhak saja, apalagi jika pengirimannya dilakukan melalui jaringan publik, apabila data tersebut tidak diamankan terlebih dahulu, akan sangat mudah disadap dan diketahui isi informasinya oleh pihak-pihak yang tidak bertanggung jawab. Oleh karena itu peneliti akan menerapkan algoritma ElGamal dan XOR untuk dapat memberikan keamanan data pada text. Algoritma XOR algoritma sederhana yang menggunakan prinsip logika. Sedangkan
APA, Harvard, Vancouver, ISO, and other styles
9

Saputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.

Full text
Abstract:
Keamanan merupakan salah satu faktor penting dalam penyimpanan dan pengiriman data atau pesan. Salah satu cara untuk mengamankan dokumen adalah dengan menggunakan algoritma kriptografi. Kriptografi berdasarkan jenis kuncinya dibedakan menjadi dua yaitu kriptografi simetris dan asimetris. Algoritma enkripsi asimetris termasuk Rivest–Shamir–Adleman (RSA), Diffie-Hellman, Digital Secure Algorithm (DSA), XTR, Elliptic Curve Cryptography (ECC), dan Elgamal Encryption System (ESS). Dalam makalah ini akan melakukan survei paper terkait algoritma-algoritma enkripsi asimetris. Implementasi kriptografi
APA, Harvard, Vancouver, ISO, and other styles
10

Ramadani, Suci. "HYBIRD CRYPTOSYSTEM ALGORITMA HILL CIPHER DAN ALGORITMA ELGAMAL PADA KEAMANAN CITRA." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 1–9. http://dx.doi.org/10.46880/jmika.vol4no1.pp1-9.

Full text
Abstract:
Perkembangan Teknologi pada saat ini memungkinkan setiap orang untuk saling bertukar informasi tanpa ada batasan waktu dan jarak. Kemungkinan yang akan terjadi adanya kebocoran data pada saat proses pertukaran informasi yang dilakukan, oleh karena itu dalam pengiriman data khususnya citra, aspek keamanan, kerahasiaan dan efesiensi penyimpanan data sangat diperlukan. Jika informasi penting tersebut jatuh ke tangan orang yang salah, maka akan menyebabkan hal yang tidak diinginkan, contohnya manipulasi gambar dengan bentuk yang negatif dan dapat merugikan pemilik gambar. Salah satu metode yang di
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Algorytm ElGamala"

1

Morais, Glauber Dantas. "A Matemática Via Algoritmo de Criptografia El Gamal." Universidade Federal da Paraíba, 2013. http://tede.biblioteca.ufpb.br:8080/handle/tede/7479.

Full text
Abstract:
Submitted by Viviane Lima da Cunha (viviane@biblioteca.ufpb.br) on 2015-05-19T15:20:50Z No. of bitstreams: 2 arquivototal.pdf: 1103922 bytes, checksum: fee5e8830b60905917fc3ab1fb8c2aae (MD5) license_rdf: 22190 bytes, checksum: 19e8a2b57ef43c09f4d7071d2153c97d (MD5)<br>Approved for entry into archive by Viviane Lima da Cunha (viviane@biblioteca.ufpb.br) on 2015-05-19T15:21:56Z (GMT) No. of bitstreams: 2 arquivototal.pdf: 1103922 bytes, checksum: fee5e8830b60905917fc3ab1fb8c2aae (MD5) license_rdf: 22190 bytes, checksum: 19e8a2b57ef43c09f4d7071d2153c97d (MD5)<br>Made available in DSpace on 2
APA, Harvard, Vancouver, ISO, and other styles
2

Ragazzini, Laura. "Applicazioni del problema del logaritmo discreto in crittografia." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23061/.

Full text
Abstract:
L'obiettivo della tesi è quello di introdurre il logaritmo discreto al fine di analizzare nel dettaglio alcuni dei principali algoritmi basati su di esso. Nel primo capitolo verranno descritte la crittografia a chiave privata e la crittografia a chiave pubblica, definite le funzioni unidirezionali e la firma digitale. Nel secondo capitolo, dopo un'introduzione sui gruppi finiti, viene definito il logaritmo discreto, le sue proprietà e le soluzioni del DLP in Z*_p. Inoltre verranno descritti i principali algoritmi basati sul problema del logaritmo discreto (DLP): il protocollo di scambio di chi
APA, Harvard, Vancouver, ISO, and other styles
3

Abu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.

Full text
Abstract:
Data security will play a central role in the design of future IT systems. The PC has been a major driver of the digital economy. Recently, there has been a shift towards IT applications realized as embedded systems, because they have proved to be good solutions for many applications, especially those which require data processing in real time. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Most of these embedded applications will be wireless, which makes the communication channel vul
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Pranav, and Binay Prakash Dungdung. "An extension of elgamal digital signature algorithm." Thesis, 2012. http://ethesis.nitrkl.ac.in/3769/1/THESIS_108CS025_%26_108CS072.pdf.

Full text
Abstract:
As for the problem that ElGamal digital signature scheme’s security is constantly being challenged and is becoming more and more serious, an improved ElGamal digital signature algorithm was proposed. As the original ElGamal algorithm has its own security disadvantages that only one random number is used, in order to improve its security, the proposed scheme improved this demerit by adding a random number to the original one and increasing difficulty of deciphering key. The security of the improved signature scheme is the same with the ElGamal signature scheme which is based on the difficult co
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Algorytm ElGamala"

1

Koç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. "ElGamal Algorithm." In Partially Homomorphic Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Omran, Eman Hatem, and Rana Jumaa Sarih Al-Janabi. "Modified ElGamal Algorithm Using Three Paring Functions." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1412-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pal, Prashnatita, Bikash Chandra Sahana, S. Ghosh, Jayanta Poray, and Amiya Kumar Mallick. "Voice Password-Based Secured Communication Using RSA and ElGamal Algorithm." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4299-6_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Othman, Soufiene Ben, Abdelbasset Trad, Hani Alzaid, and Habib Youssef. "Performance Evaluation of EC-ElGamal Encryption Algorithm for Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37893-5_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mogollon, Manuel. "Confidentiality." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch005.

Full text
Abstract:
Asymmetric encryption is a form of cryptography in which one key is used to encipher and the other to decipher. The two keys are mathematically related, and if it is possible to make one of the keys public and still maintain the algorithm security, then the system is called public-key. The most used public-key ciphers, the Pohlig-Hellman algorithm, the RSA algorithm, the ElGamal algorithm, and Diffie-Hellman, are discussed in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
6

Mogollon, Manuel. "Elliptic Curve Cryptograpy." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch008.

Full text
Abstract:
For the same level of security that public-key cryptosystems such as RSA have, elliptic curve cryptography (ECC) offers the benefit of smaller key sizes, hence smaller memory and processor requirements. The Diffie-Hellman key exchange, ElGamal encryption, digital signatures, and the Digital Signature Algorithm (DSA) can all be implemented in ECC. This makes ECC a very attractive algorithm for wireless devices such as handhelds and PDAs, which have limited bandwidth and processing power. Running on the same platform, ECC runs more TLS/SSL transactions per second than RSA. This chapter describes
APA, Harvard, Vancouver, ISO, and other styles
7

Krishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.

Full text
Abstract:
Cloud computing is leading the technology development of today's communication scenario. This is because of its cost-efficiency and flexibility. In Cloud computing vast amounts of data are stored in varied and distributed environments, and security to data is of prime concern. RSA or Elliptic Curve Cryptography (ECC) provides a secure means of message transmission among communicating hosts using Diffie Hellman Key Exchange algorithm or ElGamal algorithm. By having key lengths of 160 bits, the ECC algorithm provides sufficient strength against crypto analysis and its performance can be compared
APA, Harvard, Vancouver, ISO, and other styles
8

Krishna, A. V. N. "A Randomized Cloud Library Security Environment." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch016.

Full text
Abstract:
Cloud computing is leading the technology development of today’s communication scenario. This is because of its cost-efficiency and flexibility. In Cloud computing vast amounts of data are stored in varied and distributed environments, and security to data is of prime concern. RSA or Elliptic Curve Cryptography (ECC) provides a secure means of message transmission among communicating hosts using Diffie Hellman Key Exchange algorithm or ElGamal algorithm. By having key lengths of 160 bits, the ECC algorithm provides sufficient strength against crypto analysis and its performance can be compared
APA, Harvard, Vancouver, ISO, and other styles
9

Peng, Kun. "Theory and Practice of Secure E-Voting Systems." In Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch017.

Full text
Abstract:
Electronic voting is a popular application of cryptographic and network techniques to e-government. Most of the existing e-voting schemes can be classified into two categories: homomorphic voting and shuffling-based voting. In a homomorphic voting, an encryption algorithm with special homomorphic property (e.g. ElGamal encryption or Paillier encryption) is employed to encrypt the votes such that the sum of the votes can be recovered without decrypting any single vote. An advantage of homomorphic voting is efficient tallying. Tallying in homomorphic voting only costs one single decryption opera
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Algorytm ElGamala"

1

yuan, haifeng, xiaoli Qin, and yanzhao Tian. "A non-interactive blind signature algorithm based on ElGamal." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Prashant, Sonal Sharma, and Ravi Shankar Dhakar. "Modified Elgamal Cryptosystem Algorithm (MECA)." In 2011 2nd International Conference on Computer and Communication Technology (ICCCT). IEEE, 2011. http://dx.doi.org/10.1109/iccct.2011.6075141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Zengqiang, Di Su, and Gang Ding. "ElGamal algorithm for encryption of data transmission." In 2014 International Conference on Mechatronics and Control (ICMC). IEEE, 2014. http://dx.doi.org/10.1109/icmc.2014.7231798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

M. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.

Full text
Abstract:
The importance of data encryption has grown dramatically, especially in terms of personal data. The elliptic curve cryptosystem is the major solution for data security because it has become more prevalent. Security and privacy are required to ensure the data has recently generated much concern within the research community. This paper's objective is to obtain a complicated and secure ciphertext and make cryptanalysis difficult. In this paper, we modified the El-Gamal Elliptic Curve Cryptosystem (ECC) by producing new secret keys for encrypting data and embedding messages by using Discrete Loga
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Dewu, and Wei Chen. "3G communication encryption algorithm based on ECC-ElGamal." In 2010 2nd International Conference on Signal Processing Systems (ICSPS). IEEE, 2010. http://dx.doi.org/10.1109/icsps.2010.5555894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Shoutong. "A Digital Signature System Based on ElGamal Algorithm." In CNSCT 2025: 2025 4th International Conference on Cryptography, Network Security and Communication Technology. ACM, 2025. https://doi.org/10.1145/3723890.3723934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Iswari, Ni Made Satvika. "Key generation algorithm design combination of RSA and ElGamal algorithm." In 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE). IEEE, 2016. http://dx.doi.org/10.1109/iciteed.2016.7863255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kacaribu, Alexander Edi Suranta, and Ratnadewi. "Multiplying cipher images on visual cryptography with ElGamal algorithm." In 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE). IEEE, 2015. http://dx.doi.org/10.1109/icitacee.2015.7437790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bing-cheng, Qiu, Yao Yang-xin, Zhang Xi-min, and Chen Yin-dong. "Iterative Composite Encryption Algorithm Based on Tea and Elgamal." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Atiqah Rosly, Nurul, Abdul Aziz Mohd Zafran, Hashim Habibah, Syed Adnan Syed Farid, and Mat Isa Mohd Anuar. "Cryptographic Computation Using ElGamal Algorithm in 32-bit Computing System." In Third International Conference on Control, Automation and Systems Engineering (CASE-13). Atlantis Press, 2013. http://dx.doi.org/10.2991/case-13.2013.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!