Journal articles on the topic 'Algorytm ElGamala'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Algorytm ElGamala.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Andrian, Yudhi. "Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci." Creative Information Technology Journal 1, no. 3 (2015): 194. http://dx.doi.org/10.24076/citec.2014v1i3.21.
Full textNeyman, Shelvie, and Selfi Qisthina. "Pengamanan Internet of Things untuk Tanda Tangan Digital Menggunakan Algoritme Elgamal Signature Scheme." Jurnal Ilmu Komputer dan Agri-Informatika 8, no. 1 (2021): 69–78. http://dx.doi.org/10.29244/jika.8.1.69-78.
Full textRamadani, Suci. "HYBIRD CRYPTOSYSTEM ALGORITMA HILL CIPHER DAN ALGORITMA ELGAMAL PADA KEAMANAN CITRA." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 1–9. http://dx.doi.org/10.46880/jmika.vol4no1.pp1-9.
Full textSaputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.
Full textRamadani, Suci. "Hybird Cryptosystem Algoritma Hill Cipher Dan Algoritma ElGamal Pada Keamanan Citra." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 1–9. http://dx.doi.org/10.46880/jmika.v4i1.138.
Full textKhatri, Shefali, Punit Sharma, Arvind Negi, and Himanshu Gupta. "Thwarting Sybil Attack using ElGamal Algorithm." International Journal of Computer Applications 121, no. 21 (2015): 44–48. http://dx.doi.org/10.5120/21828-5085.
Full textNguyen Duc, Toan, and Hong Bui The. "Building Background to the Elgamal Algorithm." International Journal of Mathematical Sciences and Computing 3, no. 3 (2017): 39–49. http://dx.doi.org/10.5815/ijmsc.2017.03.04.
Full textSann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.
Full textWidarma, Adi. "COMBINATION AES, RC4 AND ELGAMAL ALGORITHM IN HYBRID SCHEME FOR DATA SECURITY." Computer Engineering, Science and System Journal 1, no. 1 (2016): 1–8. http://dx.doi.org/10.24114/cess.v1i1.4040.
Full textAtmaja, Niko Surya. "Kerahasiaan Teks Basis Data MySQL Menggunakan Algoritma Elgamal." Jurnal Sistim Informasi dan Teknologi 1, no. 4 (2019): 65–71. http://dx.doi.org/10.35134/jsisfotek.v1i4.17.
Full textAsri, Rahmadi, Mahyuddin K. M. Nasution, and Suherman Suherman. "Modification of chipertext Elgamal algorithm using split merge." Journal of Physics: Conference Series 1235 (June 2019): 012054. http://dx.doi.org/10.1088/1742-6596/1235/1/012054.
Full textHarahap, Ahir Yugo Nugroho, Heri Gunawan, Adnan Buyung Nst, and Ria Eka Sari. "PENERAPAN ELGAMAL GUNA MENINGKATKAN KEAMANAN DATA TEXT DAN DOCX." IT (INFORMATIC TECHNIQUE) JOURNAL 10, no. 1 (2022): 76. http://dx.doi.org/10.22303/it.10.1.2022.76-86.
Full textIbrahim, Fachriyana Rizki, and Arry Avorizano. "Implementasi Algoritma ElGamal Dalam Proses Enkripsi dan Dekripsi Untuk Pengamanan Citra Digital Pada Perangkat Mobile." Prosiding Seminar Nasional Teknoka 4 (December 30, 2019): I83—I90. http://dx.doi.org/10.22236/teknoka.v4i0.4210.
Full textMawengkang, H., A. F. Siregar, and S. Efendi. "Combination analysis of ElGamal algorithm and LUC algorithm in file security." IOP Conference Series: Materials Science and Engineering 420 (October 1, 2018): 012130. http://dx.doi.org/10.1088/1757-899x/420/1/012130.
Full textIndahwati, Nonik, and Agus Prihanto. "Penerapan Algoritma Kriptografi Asimetris Elgamal dengan Modifikasi Pembangkit Kunci terhadap Enkripsi dan Dekripsi Gambar Warna." Journal of Informatics and Computer Science (JINACS) 1, no. 02 (2020): 97–103. http://dx.doi.org/10.26740/jinacs.v1n02.p97-103.
Full textPrayoga, Adek Imam, and Yusfrizal Yusfrizal. "APLIKASI PENGAMANAN FILE GAMBAR MENGGUNAKAN RAIL FENCE CIPHER DAN ELGAMAL BERBASIS DESKTOP." IT (INFORMATIC TECHNIQUE) JOURNAL 8, no. 2 (2021): 132. http://dx.doi.org/10.22303/it.8.2.2020.132-140.
Full textS, Edy Victor Haryanto. "Optimizing the Confidentiality of Lecturer Database using Elgamal Algorithm." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (2020): 4671–77. http://dx.doi.org/10.30534/ijatcse/2020/69942020.
Full textPandey, Atul, Indivar Gupta, and Dhiraj Kumar Singh. "Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings." Journal of Mathematical Cryptology 15, no. 1 (2020): 266–79. http://dx.doi.org/10.1515/jmc-2019-0054.
Full textAlfiah, Fifit, Rio Sudarji, and Dzakwan Taqiyyuddin Al Fatah. "Aplikasi Kriptografi Dengan Menggunakan Algoritma Elgamal Berbasis Java Desktop Pada Pt. Wahana Indo Trada Nissan Jatake." ADI Bisnis Digital Interdisiplin Jurnal 1, no. 1 (2020): 22–34. http://dx.doi.org/10.34306/abdi.v1i1.114.
Full textWei, Wen Shan, Xian Xiao Meng, and Hai Hua Li. "Digital Signature Technology Research of Distance Education Network Security Authentication." Advanced Materials Research 267 (June 2011): 831–36. http://dx.doi.org/10.4028/www.scientific.net/amr.267.831.
Full textFang, Yi, Linhu Cong, and Jianqiu Deng. "Research and Design of an Improved ElGamal Digital Signature Algorithm." IOP Conference Series: Materials Science and Engineering 569 (August 9, 2019): 052041. http://dx.doi.org/10.1088/1757-899x/569/5/052041.
Full textAditya, Heru, Intan Nur Farida, and Risky Aswi Ramadhani. "Heru Aditya Penerapan Algoritma Elgamal dan SSL Pada Aplikasi Group Chat." Generation Journal 2, no. 1 (2018): 48. http://dx.doi.org/10.29407/gj.v2i1.12052.
Full textSusilawati, Susilawati. "Perancangan Kunci Public RSA dan ElGamal pada Kriptografi untuk Kemananan Informasi." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 1, no. 2 (2018): 82. http://dx.doi.org/10.31289/jite.v1i2.1429.
Full textJeevitha, S., and N. Amutha Prabha N.Amutha Prabha. "Secure medical image steganography based on Discrete Wavelet Transformation and ElGamal encryption algorithm." International Journal Artificial Intelligent and Informatics 3, no. 1 (2022): 13–28. http://dx.doi.org/10.33292/ijarlit.v3i1.44.
Full textRachmawati, D., A. S. Harahap, and R. N. Purba. "A hybrid cryptosystem approach for data security by using triple DES algorithm and ElGamal algorithm." IOP Conference Series: Materials Science and Engineering 453 (November 29, 2018): 012018. http://dx.doi.org/10.1088/1757-899x/453/1/012018.
Full textRofiq, Muhammad, and Bambang Tri Wahjo Utomo. "IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID." Jurnal Ilmiah Informatika 1, no. 1 (2016): 7–16. http://dx.doi.org/10.35316/jimi.v1i1.437.
Full textHardi, S. M., J. T. Tarigan, and N. Safrina. "Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm." Journal of Physics: Conference Series 978 (March 2018): 012068. http://dx.doi.org/10.1088/1742-6596/978/1/012068.
Full textSurya Permana, Indra, Taufik Hidayat, and Rahutomo Mahardiko. "RAW DATA SECURITY BY USING ELGAMAL AND SHA 256 PUBLIC KEY ALGORITHM." TEKNOKOM 4, no. 1 (2021): 1–6. http://dx.doi.org/10.31943/teknokom.v4i1.53.
Full textSapna Kumari, C., C. N. Asha, U. Rajashekhar, and K. Viswanath. "Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques." International Journal of Biology and Biomedical Engineering 16 (January 3, 2022): 46–63. http://dx.doi.org/10.46300/91011.2022.16.7.
Full textLi, Huan, Ye Qi Ru, Yi Kang Li, and Hao Guo. "Information Security Protection Design of Electric Vehicles Charging Station." Applied Mechanics and Materials 741 (March 2015): 681–86. http://dx.doi.org/10.4028/www.scientific.net/amm.741.681.
Full textSoundararajan, J. "ENHANCED SECURITY FOR HOP BY HOP WIRELESS SENSOR NETWORK USING ELGAMAL ENCRYPTION ALGORITHM." International Journal of Advanced Research in Computer Science 9, no. 2 (2018): 777–79. http://dx.doi.org/10.26483/ijarcs.v9i2.5918.
Full textLokeshwari, G., S. Udaya Kumar, and Sree Vidya Susarla. "An Efficient Image Encryption Using Merkle-Hellman, Elgamal and Genetic Algorithm for Color Images." Applied Mechanics and Materials 719-720 (January 2015): 1140–47. http://dx.doi.org/10.4028/www.scientific.net/amm.719-720.1140.
Full textHardi, Sri Melvani, Daniel Hamonangan, and Muahmmad Zarlis. "IMPLEMENTASI KRIPTOGRAFI HIBRID DENGAN ALGORITMA ELGAMAL DAN ALGORITMA ONETIME PAD(OTP) DALAM PENGAMANAN FILE AUDIO BERBASIS DESKTOP." TECHSI - Jurnal Teknik Informatika 10, no. 2 (2018): 129. http://dx.doi.org/10.29103/techsi.v10i2.903.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textChen, Tzer Long, Yu Fang Chung, Jian Mao Hong, Jeng Hong Jhong, Chin Sheng Chen, and Tzer Shyong Chen. "A Hierarchical Access Control Scheme Based on Lagrange Interpolation and ELGamal Algorithm with Numerical Experiments." Applied Mechanics and Materials 385-386 (August 2013): 1705–7. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1705.
Full textLi, Bin, Chen Lei Cao, Jian Yi Liu, and Jin Xia Wei. "A New Delegation Provable Data Possession in Public Cloud Storage." Applied Mechanics and Materials 644-650 (September 2014): 2239–44. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2239.
Full textGuruprakash, J., and Srinivas Koppu. "EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT Domain." IEEE Access 8 (2020): 141269–81. http://dx.doi.org/10.1109/access.2020.3013282.
Full textRachmawati, Dian, Mohammad Andri Budiman, and Cut Amalia Saffiera. "An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security." IOP Conference Series: Materials Science and Engineering 300 (January 2018): 012040. http://dx.doi.org/10.1088/1757-899x/300/1/012040.
Full textBudiman, M. A., E. M. Zamzami, and C. L. Ginting. "A Crypto Compression System Using ElGamal Public Key Encryption Algorithm and Even-Rodeh Codes." Journal of Physics: Conference Series 1566 (June 2020): 012071. http://dx.doi.org/10.1088/1742-6596/1566/1/012071.
Full textEnriquez, Michael, Den Whilrex Garcia, and Edwin Arboleda. "Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems." Indian Journal of Science and Technology 10, no. 27 (2017): 1–14. http://dx.doi.org/10.17485/ijst/2017/v10i27/105001.
Full textGarg, Gemini, and Jaspreet Kaur. "A Crossbreed approach to Enhanced Security of Multimedia Data using SKIP JACK and Elgamal Algorithm." International Journal of Computer Applications 129, no. 16 (2015): 1–5. http://dx.doi.org/10.5120/ijca2015906776.
Full textGoswami, Pinkimani, Madan Mohan Singh, and Bubu Bhuyan. "A new public key scheme based on DRSA and generalized GDLP." Discrete Mathematics, Algorithms and Applications 08, no. 04 (2016): 1650057. http://dx.doi.org/10.1142/s1793830916500579.
Full textTAO, WANG, YI XIAN YANG, and XIN XIN NIU. "NEW EFFICIENT TIMED COMMITMENT SCHEMES." International Journal of Information Technology & Decision Making 02, no. 02 (2003): 287–97. http://dx.doi.org/10.1142/s0219622003000616.
Full textPutra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.
Full textBufalo, Michele, Daniele Bufalo, and Giuseppe Orlando. "A Note on the Computation of the Modular Inverse for Cryptography." Axioms 10, no. 2 (2021): 116. http://dx.doi.org/10.3390/axioms10020116.
Full textRachmawati, Dian, Amer Sharif, and Ericko. "Hybrid Cryptosystem Combination Algorithm Of Hill Cipher 3x3 and Elgamal To Secure Instant Messaging For Android." Journal of Physics: Conference Series 1235 (June 2019): 012074. http://dx.doi.org/10.1088/1742-6596/1235/1/012074.
Full textNarasimha Nayak, V., M. Ravi Kumar, K. Anusha, and Ch Kranthi Kiran. "FPGA based asymmetric crypto system design." International Journal of Engineering & Technology 7, no. 1.1 (2017): 612. http://dx.doi.org/10.14419/ijet.v7i1.1.10788.
Full textPurnomo Sidik, Agung, Syahril Efendi, and Suherman Suherman. "Improving One-Time Pad Algorithm on Shamir’s Three-Pass Protocol Scheme by Using RSA and ElGamal Algorithms." Journal of Physics: Conference Series 1235 (June 2019): 012007. http://dx.doi.org/10.1088/1742-6596/1235/1/012007.
Full textSulistiyorini, Sulistiyorini, and Agus Prihanto. "Perbandingan Efisiensi Algoritma RSA dan RSA-CRT Dengan Data Teks Berukuran Besar." Journal of Informatics and Computer Science (JINACS) 1, no. 02 (2020): 84–90. http://dx.doi.org/10.26740/jinacs.v1n02.p84-90.
Full textWang, Yiting, Weiqiang Qiu, Ling Dong, et al. "Proxy Signature-Based Management Model of Sharing Energy Storage in Blockchain Environment." Applied Sciences 10, no. 21 (2020): 7502. http://dx.doi.org/10.3390/app10217502.
Full text