Academic literature on the topic 'Algorytm ElGamala'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Algorytm ElGamala.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Algorytm ElGamala"
Andrian, Yudhi. "Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci." Creative Information Technology Journal 1, no. 3 (2015): 194. http://dx.doi.org/10.24076/citec.2014v1i3.21.
Full textNeyman, Shelvie, and Selfi Qisthina. "Pengamanan Internet of Things untuk Tanda Tangan Digital Menggunakan Algoritme Elgamal Signature Scheme." Jurnal Ilmu Komputer dan Agri-Informatika 8, no. 1 (2021): 69–78. http://dx.doi.org/10.29244/jika.8.1.69-78.
Full textRamadani, Suci. "HYBIRD CRYPTOSYSTEM ALGORITMA HILL CIPHER DAN ALGORITMA ELGAMAL PADA KEAMANAN CITRA." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 1–9. http://dx.doi.org/10.46880/jmika.vol4no1.pp1-9.
Full textSaputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.
Full textRamadani, Suci. "Hybird Cryptosystem Algoritma Hill Cipher Dan Algoritma ElGamal Pada Keamanan Citra." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 1–9. http://dx.doi.org/10.46880/jmika.v4i1.138.
Full textKhatri, Shefali, Punit Sharma, Arvind Negi, and Himanshu Gupta. "Thwarting Sybil Attack using ElGamal Algorithm." International Journal of Computer Applications 121, no. 21 (2015): 44–48. http://dx.doi.org/10.5120/21828-5085.
Full textNguyen Duc, Toan, and Hong Bui The. "Building Background to the Elgamal Algorithm." International Journal of Mathematical Sciences and Computing 3, no. 3 (2017): 39–49. http://dx.doi.org/10.5815/ijmsc.2017.03.04.
Full textSann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.
Full textWidarma, Adi. "COMBINATION AES, RC4 AND ELGAMAL ALGORITHM IN HYBRID SCHEME FOR DATA SECURITY." Computer Engineering, Science and System Journal 1, no. 1 (2016): 1–8. http://dx.doi.org/10.24114/cess.v1i1.4040.
Full textAtmaja, Niko Surya. "Kerahasiaan Teks Basis Data MySQL Menggunakan Algoritma Elgamal." Jurnal Sistim Informasi dan Teknologi 1, no. 4 (2019): 65–71. http://dx.doi.org/10.35134/jsisfotek.v1i4.17.
Full textDissertations / Theses on the topic "Algorytm ElGamala"
Morais, Glauber Dantas. "A Matemática Via Algoritmo de Criptografia El Gamal." Universidade Federal da Paraíba, 2013. http://tede.biblioteca.ufpb.br:8080/handle/tede/7479.
Full textRagazzini, Laura. "Applicazioni del problema del logaritmo discreto in crittografia." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23061/.
Full textAbu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Full textBook chapters on the topic "Algorytm ElGamala"
Koç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. "ElGamal Algorithm." In Partially Homomorphic Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6_5.
Full textPal, Prashnatita, Bikash Chandra Sahana, S. Ghosh, Jayanta Poray, and Amiya Kumar Mallick. "Voice Password-Based Secured Communication Using RSA and ElGamal Algorithm." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4299-6_32.
Full textOthman, Soufiene Ben, Abdelbasset Trad, Hani Alzaid, and Habib Youssef. "Performance Evaluation of EC-ElGamal Encryption Algorithm for Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37893-5_31.
Full textMogollon, Manuel. "Confidentiality." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch005.
Full textMogollon, Manuel. "Elliptic Curve Cryptograpy." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch008.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch016.
Full textPeng, Kun. "Theory and Practice of Secure E-Voting Systems." In Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch017.
Full textConference papers on the topic "Algorytm ElGamala"
Sharma, Prashant, Sonal Sharma, and Ravi Shankar Dhakar. "Modified Elgamal Cryptosystem Algorithm (MECA)." In 2011 2nd International Conference on Computer and Communication Technology (ICCCT). IEEE, 2011. http://dx.doi.org/10.1109/iccct.2011.6075141.
Full textWu, Zengqiang, Di Su, and Gang Ding. "ElGamal algorithm for encryption of data transmission." In 2014 International Conference on Mechatronics and Control (ICMC). IEEE, 2014. http://dx.doi.org/10.1109/icmc.2014.7231798.
Full textXu, Dewu, and Wei Chen. "3G communication encryption algorithm based on ECC-ElGamal." In 2010 2nd International Conference on Signal Processing Systems (ICSPS). IEEE, 2010. http://dx.doi.org/10.1109/icsps.2010.5555894.
Full textIswari, Ni Made Satvika. "Key generation algorithm design combination of RSA and ElGamal algorithm." In 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE). IEEE, 2016. http://dx.doi.org/10.1109/iciteed.2016.7863255.
Full textKacaribu, Alexander Edi Suranta, and Ratnadewi. "Multiplying cipher images on visual cryptography with ElGamal algorithm." In 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE). IEEE, 2015. http://dx.doi.org/10.1109/icitacee.2015.7437790.
Full textBing-cheng, Qiu, Yao Yang-xin, Zhang Xi-min, and Chen Yin-dong. "Iterative Composite Encryption Algorithm Based on Tea and Elgamal." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.744.
Full textArpit and Ashwini Kumar. "Verification of elgamal algorithm cryptographic protocol using linear temporal logic." In 2011 International Conference on Multimedia Technology (ICMT). IEEE, 2011. http://dx.doi.org/10.1109/icmt.2011.6002114.
Full textAtiqah Rosly, Nurul, Abdul Aziz Mohd Zafran, Hashim Habibah, Syed Adnan Syed Farid, and Mat Isa Mohd Anuar. "Cryptographic Computation Using ElGamal Algorithm in 32-bit Computing System." In Third International Conference on Control, Automation and Systems Engineering (CASE-13). Atlantis Press, 2013. http://dx.doi.org/10.2991/case-13.2013.16.
Full textXiao-fei, Li, Shen Xuan-jing, and Chen Hai-peng. "An Improved ElGamal Digital Signature Algorithm Based on Adding a Random Number." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.190.
Full textAjeena, Ruma Kareem K., and Sarah Jabbar Yaqoob. "The integer sub-decomposition method to improve the elliptic elgamal digital signature algorithm." In 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT). IEEE, 2017. http://dx.doi.org/10.1109/crcsit.2017.7965554.
Full text