Academic literature on the topic 'ElGamal signature'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ElGamal signature.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ElGamal signature"
Sow, Demba, and Mamadou Ghouraissiou Camara. "Provable Security of The Generalized ElGamal Signature Scheme." Journal of Mathematics Research 11, no. 6 (2019): 77. http://dx.doi.org/10.5539/jmr.v11n6p77.
Full textLubis, Rizka Khairani, A M H Pardede, and Husnul Khair. "Digital Signature Security Analysis By Applying The Elgamal Algorithm And The Idea Method." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 3, no. 1 (2023): 373–82. http://dx.doi.org/10.59934/jaiea.v3i1.336.
Full textIavich, Maksim, and Dana Amirkhanova Sairangazhykyzy. "Post-quantum Digital Signatures using ElGamal Approach." International Journal of Computer Network and Information Security 17, no. 3 (2025): 89–108. https://doi.org/10.5815/ijcnis.2025.03.06.
Full textIhia, M., and O. Khadir. "A generalization of ElGamal signature variants over elliptic curves." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 8 (2024): 2241–55. https://doi.org/10.47974/jdmsc-1637.
Full textNeyman, Shelvie, and Selfi Qisthina. "Pengamanan Internet of Things untuk Tanda Tangan Digital Menggunakan Algoritme Elgamal Signature Scheme." Jurnal Ilmu Komputer dan Agri-Informatika 8, no. 1 (2021): 69–78. http://dx.doi.org/10.29244/jika.8.1.69-78.
Full textNguyen, Dao Truong, Le Van Tuan, Doan Thi Bich Ngoc, and Dang Duc Trinh. "Proposing an efficient implementation method for exponentiation in digital signature scheme on ring Zn." Journal of Military Science and Technology, no. 83 (November 18, 2022): 72–81. http://dx.doi.org/10.54939/1859-1043.j.mst.83.2022.72-81.
Full textAmir, Mohammad, and Brijesh Shukla. "A Variant of ElGamal Digital Signature Scheme." International Journal of Science and Research (IJSR) 11, no. 9 (2022): 243–44. http://dx.doi.org/10.21275/sr22905144607.
Full textAdeniyi, Emmanuel A., Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen, and Salil Bharany. "Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions." Information 13, no. 10 (2022): 442. http://dx.doi.org/10.3390/info13100442.
Full textM., Ali. "An Organizational Signature Schemes based on ElGamal Signature." International Journal of Applied Information Systems 10, no. 4 (2016): 6–9. http://dx.doi.org/10.5120/ijais2016451483.
Full textKim, Sungwook, Jihye Kim, Jung Hee Cheon, and Seong-ho Ju. "Threshold signature schemes for ElGamal variants." Computer Standards & Interfaces 33, no. 4 (2011): 432–37. http://dx.doi.org/10.1016/j.csi.2011.01.004.
Full textDissertations / Theses on the topic "ElGamal signature"
Fersch, Manuel [Verfasser], Eike [Gutachter] Kiltz, and Bertram [Gutachter] Poettering. "The provable security of elgamal-type signature schemes / Manuel Fersch ; Gutachter: Eike Kiltz, Bertram Poettering ; Fakultät für Mathematik." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1165304678/34.
Full textValkaitis, Mindaugas. "Efektyvios šifravimo bei skaitmeninio parašo sistemos." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545.
Full textLu, Yih-Chi, and 盧奕吉. "A New Ring Signature Scheme Based on ElGamal-like Signature." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/35427526242373906111.
Full text"On forging ElGamal signature and other attacks." 2000. http://library.cuhk.edu.hk/record=b5890386.
Full textKumar, Pranav, and Binay Prakash Dungdung. "An extension of elgamal digital signature algorithm." Thesis, 2012. http://ethesis.nitrkl.ac.in/3769/1/THESIS_108CS025_%26_108CS072.pdf.
Full textChen, Cheng-huan, and 陳震寰. "New Blind Signatures Based on RSA and ElGamal Signatures." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/92108922873986986857.
Full textLiao, Wen Yuan, and 廖文淵. "A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/71016418259268854585.
Full textChen, Feng-Mei, and 陳鳳美. "A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/57702972827945168057.
Full textLiou, Feng Yi, and 劉鳳儀. "A Digital Multisignature Scheme Based upon Modified ElGamal's Public Key Cryptosystem and Its Digital Signature Scheme." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/34661346545455336832.
Full textBook chapters on the topic "ElGamal signature"
Boneh, Dan. "ElGamal Digital Signature Scheme." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_147.
Full textBoneh, Dan. "ElGamal Digital Signature Scheme." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_147.
Full textRen, Jian, and Lein Harn. "Ring Signature Based on ElGamal Signature." In Wireless Algorithms, Systems, and Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11814856_43.
Full textAcan, Hüseyin, Kamer Kaya, and Ali Aydın Selçuk. "Capture Resilient ElGamal Signature Protocols." In Computer and Information Sciences – ISCIS 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11902140_98.
Full textShparlinski, Igor. "Distribution of the ElGamal Signature." In Cryptographic Applications of Analytic Number Theory. Birkhäuser Basel, 2003. http://dx.doi.org/10.1007/978-3-0348-8037-4_18.
Full textBiernat, Janusz, and Maciej Nikodem. "Fault Cryptanalysis of ElGamal Signature Scheme." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556985_43.
Full textZahhafi, Leila, and Omar Khadir. "An ElGamal-Like Digital Signature Based on Elliptic Curves." In Mobile, Secure, and Programmable Networking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22885-9_23.
Full textFu, De-Sheng, and Jiao Yang. "A Sequential Multi-Signature Scheme Based on ElGamal Meteorological File." In Lecture Notes in Electrical Engineering. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4850-0_55.
Full textMohit, Prerna, and G. P. Biswas. "Modification of ElGamal Cryptosystem into Data Encryption and Signature Generation." In Proceedings of International Conference on Big Data, Machine Learning and Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4788-5_10.
Full textBing, Han, Wang Bo, and Zhang Hui. "A Design and Realization of Digital Signature of E-government Management Website Group Based on Elgamal Cipher System." In Pervasive Computing and the Networked World. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09265-2_16.
Full textConference papers on the topic "ElGamal signature"
Hwang, Min-Shiang, Yung-Ling Chang, Chia-Chun Wu, and Cheng-Ying Yang. "A Blind Signature Scheme Based on ElGamal Signature Scheme." In 2024 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS). IEEE, 2024. https://doi.org/10.1109/ispacs62486.2024.10868418.
Full textHorster, Patrick, Holger Petersen, and Markus Michels. "Meta-ElGamal signature schemes." In the 2nd ACM Conference. ACM Press, 1994. http://dx.doi.org/10.1145/191177.191197.
Full textKuo, Wen-Chung. "On ElGamal Signature Scheme." In Future Generation Communication and Networking (FGCN 2007). IEEE, 2007. http://dx.doi.org/10.1109/fgcn.2007.173.
Full textChen, Haipeng, Xuanjing Shen, Yingda Lv, and Jiaying Lin. "An Improvement of ElGamal Digital Signature Scheme." In 2009 International Conference on Information Engineering and Computer Science. IEEE, 2009. http://dx.doi.org/10.1109/iciecs.2009.5363489.
Full textNikodem, Maciej. "ElGamal Signature Scheme Immune to Fault Analysis." In 2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX. IEEE, 2008. http://dx.doi.org/10.1109/depcos-relcomex.2008.55.
Full textWang, Huaqun, Shengju Han, Changhui Deng, and Futai Zhang. "Cryptanalysis and Improvement of a Ring Signature Based on ElGamal Signature." In 2009 WRI World Congress on Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/wcse.2009.96.
Full textHuang, Shoutong. "A Digital Signature System Based on ElGamal Algorithm." In CNSCT 2025: 2025 4th International Conference on Cryptography, Network Security and Communication Technology. ACM, 2025. https://doi.org/10.1145/3723890.3723934.
Full textBaozheng, Yu, and Xu Congwei. "Security Analysis on a Blind Signature Scheme Based on Elgamal Signature Equation." In 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007). IEEE, 2007. http://dx.doi.org/10.1109/cisw.2007.4425601.
Full textElkabbany, Ghada F., Mohamed Rasslan, and Heba K. Aslan. "Enhanement of elgamal signature scheme using multi-processing system." In 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 Intl Conf on New Paradigms in Electronics & Information Technology (PEIT). IEEE, 2017. http://dx.doi.org/10.1109/accs-peit.2017.8303039.
Full textHaraty, Ramzi A., A. N. El-Kassar, and Bilal M. Shebaro. "A Comparative Study of Elgamal Based Digital Signature Algorithms." In 2006 World Automation Congress. IEEE, 2006. http://dx.doi.org/10.1109/wac.2006.375953.
Full text