Academic literature on the topic 'Algorytm ElGamala'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Algorytm ElGamala.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Algorytm ElGamala"
Zakaria, M. Nanak, Yoyok Heru Prasetyo Isnomo, Junaedi Adi Prasetyo, and Dwinnar Rosyidan. "Implementasi algoritma elgamal untuk pengamanan data pada wireless sensor network." JURNAL ELTEK 23, no. 1 (2025): 24–31. https://doi.org/10.33795/eltek.v23i1.6910.
Full textAndrian, Yudhi. "Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci." Creative Information Technology Journal 1, no. 3 (2015): 194. http://dx.doi.org/10.24076/citec.2014v1i3.21.
Full textSidik, Agung Purnomo. "Algoritma Hybrid dengan Kombinasi Elgamal Algorithm dan Electronic Code Book untuk Mengatasi Masalah Key Distribution." JURNAL UNITEK 15, no. 2 (2022): 114–22. http://dx.doi.org/10.52072/unitek.v15i2.309.
Full textHamdani, Hamdani, Nurika Rahmadani, Zainal Arifin, and Refi Riduan Achmad. "Analisis Perbandingan Performa Algoritma Asimetris Elgamal Dan Merkle-Hellman-Knapsack Pada Pesan Teks." Jurnal Informatika Komputer, Bisnis dan Manajemen 23, no. 1 (2025): 48–55. https://doi.org/10.61805/fahma.v23i1.158.
Full textNeyman, Shelvie, and Selfi Qisthina. "Pengamanan Internet of Things untuk Tanda Tangan Digital Menggunakan Algoritme Elgamal Signature Scheme." Jurnal Ilmu Komputer dan Agri-Informatika 8, no. 1 (2021): 69–78. http://dx.doi.org/10.29244/jika.8.1.69-78.
Full textFauzi, Achmad, Yani Maulita, and Novriyenni Novriyenni. "PERANCANGAN APLIKASI KEAMANAN PESAN MENGGUNAKAN ALGORITMA ELGAMAL DENGAN MEMANFAATKAN ALGORITMA ONE TIME PAD SEBAGAI PEMBANGKIT KUNCI." JTIK (Jurnal Teknik Informatika Kaputama) 1, no. 1 (2017): 1–9. http://dx.doi.org/10.59697/jtik.v1i1.680.
Full textLudyawati, Ludyawati, Muhammad Khudzaifah, and Erna Herawati. "Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia." Jurnal Riset Mahasiswa Matematika 2, no. 6 (2023): 247–56. http://dx.doi.org/10.18860/jrmm.v2i6.22041.
Full textKhairani, Khairani, and Mhd Zulfansyuri Siambaton. "Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker." sudo Jurnal Teknik Informatika 2, no. 4 (2023): 176–87. http://dx.doi.org/10.56211/sudo.v2i4.401.
Full textSaputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.
Full textRamadani, Suci. "HYBIRD CRYPTOSYSTEM ALGORITMA HILL CIPHER DAN ALGORITMA ELGAMAL PADA KEAMANAN CITRA." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 1–9. http://dx.doi.org/10.46880/jmika.vol4no1.pp1-9.
Full textDissertations / Theses on the topic "Algorytm ElGamala"
Morais, Glauber Dantas. "A Matemática Via Algoritmo de Criptografia El Gamal." Universidade Federal da Paraíba, 2013. http://tede.biblioteca.ufpb.br:8080/handle/tede/7479.
Full textRagazzini, Laura. "Applicazioni del problema del logaritmo discreto in crittografia." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23061/.
Full textAbu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Full textKumar, Pranav, and Binay Prakash Dungdung. "An extension of elgamal digital signature algorithm." Thesis, 2012. http://ethesis.nitrkl.ac.in/3769/1/THESIS_108CS025_%26_108CS072.pdf.
Full textBook chapters on the topic "Algorytm ElGamala"
Koç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. "ElGamal Algorithm." In Partially Homomorphic Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6_5.
Full textOmran, Eman Hatem, and Rana Jumaa Sarih Al-Janabi. "Modified ElGamal Algorithm Using Three Paring Functions." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1412-6_35.
Full textPal, Prashnatita, Bikash Chandra Sahana, S. Ghosh, Jayanta Poray, and Amiya Kumar Mallick. "Voice Password-Based Secured Communication Using RSA and ElGamal Algorithm." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4299-6_32.
Full textOthman, Soufiene Ben, Abdelbasset Trad, Hani Alzaid, and Habib Youssef. "Performance Evaluation of EC-ElGamal Encryption Algorithm for Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37893-5_31.
Full textMogollon, Manuel. "Confidentiality." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch005.
Full textMogollon, Manuel. "Elliptic Curve Cryptograpy." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch008.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch016.
Full textPeng, Kun. "Theory and Practice of Secure E-Voting Systems." In Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch017.
Full textConference papers on the topic "Algorytm ElGamala"
yuan, haifeng, xiaoli Qin, and yanzhao Tian. "A non-interactive blind signature algorithm based on ElGamal." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073761.
Full textSharma, Prashant, Sonal Sharma, and Ravi Shankar Dhakar. "Modified Elgamal Cryptosystem Algorithm (MECA)." In 2011 2nd International Conference on Computer and Communication Technology (ICCCT). IEEE, 2011. http://dx.doi.org/10.1109/iccct.2011.6075141.
Full textWu, Zengqiang, Di Su, and Gang Ding. "ElGamal algorithm for encryption of data transmission." In 2014 International Conference on Mechatronics and Control (ICMC). IEEE, 2014. http://dx.doi.org/10.1109/icmc.2014.7231798.
Full textM. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.
Full textXu, Dewu, and Wei Chen. "3G communication encryption algorithm based on ECC-ElGamal." In 2010 2nd International Conference on Signal Processing Systems (ICSPS). IEEE, 2010. http://dx.doi.org/10.1109/icsps.2010.5555894.
Full textHuang, Shoutong. "A Digital Signature System Based on ElGamal Algorithm." In CNSCT 2025: 2025 4th International Conference on Cryptography, Network Security and Communication Technology. ACM, 2025. https://doi.org/10.1145/3723890.3723934.
Full textIswari, Ni Made Satvika. "Key generation algorithm design combination of RSA and ElGamal algorithm." In 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE). IEEE, 2016. http://dx.doi.org/10.1109/iciteed.2016.7863255.
Full textKacaribu, Alexander Edi Suranta, and Ratnadewi. "Multiplying cipher images on visual cryptography with ElGamal algorithm." In 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE). IEEE, 2015. http://dx.doi.org/10.1109/icitacee.2015.7437790.
Full textBing-cheng, Qiu, Yao Yang-xin, Zhang Xi-min, and Chen Yin-dong. "Iterative Composite Encryption Algorithm Based on Tea and Elgamal." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.744.
Full textAtiqah Rosly, Nurul, Abdul Aziz Mohd Zafran, Hashim Habibah, Syed Adnan Syed Farid, and Mat Isa Mohd Anuar. "Cryptographic Computation Using ElGamal Algorithm in 32-bit Computing System." In Third International Conference on Control, Automation and Systems Engineering (CASE-13). Atlantis Press, 2013. http://dx.doi.org/10.2991/case-13.2013.16.
Full text