Academic literature on the topic 'ElGamal cryptographic system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ElGamal cryptographic system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ElGamal cryptographic system"
Sann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.
Full textNarasimha Nayak, V., M. Ravi Kumar, K. Anusha, and Ch Kranthi Kiran. "FPGA based asymmetric crypto system design." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 612. http://dx.doi.org/10.14419/ijet.v7i1.1.10788.
Full textRofiq, Muhammad, and Bambang Tri Wahjo Utomo. "IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID." Jurnal Ilmiah Informatika 1, no. 1 (June 9, 2016): 7–16. http://dx.doi.org/10.35316/jimi.v1i1.437.
Full textSeo, Hwa-Jeong, and Ho-Won Kim. "EC-ELGAMAL Homomorphic Cryptography based E-voting System." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 909–16. http://dx.doi.org/10.6109/jkiice.2013.17.4.909.
Full textSann, Zarni, Thi Thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance comparison of asymmetric cryptography (case study-mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 105–11. http://dx.doi.org/10.34306/csit.v4i3.98.
Full textSaputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (March 8, 2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.
Full textSapna Kumari, C., C. N. Asha, U. Rajashekhar, and K. Viswanath. "Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques." International Journal of Biology and Biomedical Engineering 16 (January 3, 2022): 46–63. http://dx.doi.org/10.46300/91011.2022.16.7.
Full textWang, Yingjie, Jianhua Li, and Ling Tie. "A simple protocol for deniable authentication based on ElGamal cryptography." Networks 45, no. 4 (2005): 193–94. http://dx.doi.org/10.1002/net.20062.
Full textRamadani, Suci. "Hybird Cryptosystem Algoritma Hill Cipher Dan Algoritma ElGamal Pada Keamanan Citra." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (April 1, 2020): 1–9. http://dx.doi.org/10.46880/jmika.v4i1.138.
Full textPutra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (February 28, 2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.
Full textDissertations / Theses on the topic "ElGamal cryptographic system"
Abu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Full textDissertation (MEng (Computer Engineering))--University of Pretoria, 2006.
Electrical, Electronic and Computer Engineering
unrestricted
Book chapters on the topic "ElGamal cryptographic system"
Kattamuri, Sreerama Murthy, Vijayalakshmi Kakulapati, and Pallam Setty S. "Performance Analysis of Mail Clients on Low Cost Computer With ELGamal and RSA Using SNORT." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 332–53. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3870-7.ch020.
Full textÖzyılmaz, Çağla, and Ayşe Nallı. "Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem." In Implementing Computational Intelligence Techniques for Security Systems Design, 163–81. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2418-3.ch008.
Full textÇelemoğlu, Çağla, Selime Beyza Özçevik, and Şenol Eren. "Power Pell Sequences, Some Periodic Relations of These Sequences, and a Cryptographic Application With Power Pell Sequences." In Applications of Computational Science in Artificial Intelligence, 21–43. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9012-6.ch002.
Full textMogollon, Manuel. "Confidentiality." In Cryptography and Security Services, 101–21. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch005.
Full textPeng, Kun. "Theory and Practice of Secure E-Voting Systems." In Theory and Practice of Cryptography Solutions for Secure Information Systems, 428–59. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch017.
Full textConference papers on the topic "ElGamal cryptographic system"
Atiqah Rosly, Nurul, Abdul Aziz Mohd Zafran, Hashim Habibah, Syed Adnan Syed Farid, and Mat Isa Mohd Anuar. "Cryptographic Computation Using ElGamal Algorithm in 32-bit Computing System." In Third International Conference on Control, Automation and Systems Engineering (CASE-13). Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/case-13.2013.16.
Full textNalwaya, Priya, Varun P. Saxena, and Pulkit Nalwaya. "A Cryptographic Approach Based on Integrating Running Key in Feedback Mode of ElGamal System." In 2014 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2014. http://dx.doi.org/10.1109/cicn.2014.157.
Full text"A COMPARITIVE STUDY OF ELGAMAL BASED CRYPTOGRAPHIC ALGORITHMS." In 6th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002593600790084.
Full textArta, Yudhi, Hendra Pratama, Apri Siswanto, Abdul Syukur, and Panji Rachmat Setiawan. "Design of Web Login Security System using ElGamal Cryptography." In The Second International Conference on Science, Engineering and Technology. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0009186802680273.
Full textBoruah, Debabrat, and Monjul Saikia. "Implementation of ElGamal Elliptic Curve Cryptography over prime field using C." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033751.
Full text