Journal articles on the topic 'ElGamal cryptographic system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 journal articles for your research on the topic 'ElGamal cryptographic system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.
Full textNarasimha Nayak, V., M. Ravi Kumar, K. Anusha, and Ch Kranthi Kiran. "FPGA based asymmetric crypto system design." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 612. http://dx.doi.org/10.14419/ijet.v7i1.1.10788.
Full textRofiq, Muhammad, and Bambang Tri Wahjo Utomo. "IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID." Jurnal Ilmiah Informatika 1, no. 1 (June 9, 2016): 7–16. http://dx.doi.org/10.35316/jimi.v1i1.437.
Full textSeo, Hwa-Jeong, and Ho-Won Kim. "EC-ELGAMAL Homomorphic Cryptography based E-voting System." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 909–16. http://dx.doi.org/10.6109/jkiice.2013.17.4.909.
Full textSann, Zarni, Thi Thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance comparison of asymmetric cryptography (case study-mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 105–11. http://dx.doi.org/10.34306/csit.v4i3.98.
Full textSaputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (March 8, 2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.
Full textSapna Kumari, C., C. N. Asha, U. Rajashekhar, and K. Viswanath. "Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques." International Journal of Biology and Biomedical Engineering 16 (January 3, 2022): 46–63. http://dx.doi.org/10.46300/91011.2022.16.7.
Full textWang, Yingjie, Jianhua Li, and Ling Tie. "A simple protocol for deniable authentication based on ElGamal cryptography." Networks 45, no. 4 (2005): 193–94. http://dx.doi.org/10.1002/net.20062.
Full textRamadani, Suci. "Hybird Cryptosystem Algoritma Hill Cipher Dan Algoritma ElGamal Pada Keamanan Citra." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (April 1, 2020): 1–9. http://dx.doi.org/10.46880/jmika.v4i1.138.
Full textPutra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (February 28, 2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.
Full textDr. Pasumponpandian. "Development of Secure Cloud Based Storage Using the Elgamal Hyper Elliptic Curve Cryptography with Fuzzy Logic Based Integer Selection." Journal of Soft Computing Paradigm 2, no. 1 (March 15, 2020): 24–35. http://dx.doi.org/10.36548/jscp.2020.1.003.
Full textPrabhdeep Kaur and Sheetal Kalra. "On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography." Journal of Technology Management for Growing Economies 6, no. 1 (April 27, 2015): 39–52. http://dx.doi.org/10.15415/jtmge.2015.61004.
Full textLi, Qi, Hongbo Zhu, Zuobin Ying, and Tao Zhang. "Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud." Wireless Communications and Mobile Computing 2018 (June 6, 2018): 1–12. http://dx.doi.org/10.1155/2018/1701675.
Full textPradeep, K. V., V. Vijayakumar, and V. Subramaniyaswamy. "An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment." Journal of Computer Networks and Communications 2019 (June 27, 2019): 1–8. http://dx.doi.org/10.1155/2019/9852472.
Full text-, Basyiah, and Fahmy Syahputra. "Perancangan Aplikasi Penyandian Pesan Teks Menggunakan Vigenere Chiper Dan Algoritma Elgamal." MEANS (Media Informasi Analisa dan Sistem), January 11, 2018, 80–87. http://dx.doi.org/10.54367/means.v2i2.142.
Full textMurali Krishna, B., Chella Santhosh, Shruti Suman, and SK Sadhiya Shireen. "Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration." Journal of Circuits, Systems and Computers, August 5, 2021, 2250014. http://dx.doi.org/10.1142/s0218126622500141.
Full textRoman’kov, Vitaly. "Two general schemes of algebraic cryptography." Groups Complexity Cryptology, October 11, 2018. http://dx.doi.org/10.1515/gcc-2018-0009.
Full text"A Novel Authentication Method for Big Data Environment." International Journal of Recent Technology and Engineering 8, no. 3 (September 30, 2019): 3614–19. http://dx.doi.org/10.35940/ijrte.c5319.098319.
Full text"A Prototype Model of Virtual Authenticated Key Exchange Mechanism over Secured Channel in Ad-Hoc Environment." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 5526–32. http://dx.doi.org/10.35940/ijrte.e6684.018520.
Full textShajin, Francis H., and P. Rajesh. "FPGA Realization of a Reversible Data Hiding Scheme for 5G MIMO-OFDM System by Chaotic Key Generation-Based Paillier Cryptography Along with LDPC and Its Side Channel Estimation Using Machine Learning Technique." Journal of Circuits, Systems and Computers 31, no. 05 (October 29, 2021). http://dx.doi.org/10.1142/s0218126622500931.
Full text