Academic literature on the topic 'Elliptic curve elgamal cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Elliptic curve elgamal cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Elliptic curve elgamal cryptosystem"
Kamthawee, Krissanee, and Bhichate Chiewthanakul. "The Construction of ElGamal over Koblitz Curve." Advanced Materials Research 931-932 (May 2014): 1441–46. http://dx.doi.org/10.4028/www.scientific.net/amr.931-932.1441.
Full textIsmail, N. H. M., and M. Y. Misro. "Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem." Malaysian Journal of Mathematical Sciences 16, no. 3 (2022): 483–99. http://dx.doi.org/10.47836/mjms.16.3.06.
Full textLuhaib, Qasim Mohsin, and Ruma Kareem K. Ajeena. "Elliptic curve matrices over group ring to improve elliptic curve–discrete logarithm cryptosystems." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 6 (2023): 1699–704. http://dx.doi.org/10.47974/jdmsc-1616.
Full textAbdelhakim, Chillali, and M'hammed Boulagouaz. "Methods of encryption keys, example of elliptic curve." Journal of Communications and Computer Engineering 3, no. 1 (2012): 7. http://dx.doi.org/10.20454/jcce.2013.259.
Full textWu, Huangwei. "General analysis on essential mathematical principles of elliptic curve cryptography." Theoretical and Natural Science 10, no. 1 (2023): 123–29. http://dx.doi.org/10.54254/2753-8818/10/20230327.
Full textSangeetha, V., T. Anupreethi, and Manju Somanath. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal Of Science And Technology 17, no. 20 (2024): 2074–78. http://dx.doi.org/10.17485/ijst/v17i20.1183.
Full textV, Sangeetha, Anupreethi T, and Somanath Manju. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal of Science and Technology 17, no. 20 (2024): 2074–78. https://doi.org/10.17485/IJST/v17i20.1183.
Full textSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Full textPrabhdeep Kaur and Sheetal Kalra. "On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography." Journal of Technology Management for Growing Economies 6, no. 1 (2015): 39–52. http://dx.doi.org/10.15415/jtmge.2015.61004.
Full textLopez, Maria Isaura, and Ayad Barsoum. "Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography." International Journal of Cyber Research and Education 4, no. 1 (2022): 1–14. http://dx.doi.org/10.4018/ijcre.309688.
Full textDissertations / Theses on the topic "Elliptic curve elgamal cryptosystem"
Abu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Full textHo, Sun Wah. "A cryptosystem based on chaotic and elliptic curve cryptography /." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-it-b19886238a.pdf.
Full textSingh, Namita. "Secure communication using elliptic curve cryptosystem in ad hoc network." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27730.
Full textAbu, Mahfouz Adnan Mohammed I. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Pretoria : [s.n.], 2004. http://upetd.up.ac.za/thesis/available/etd-06082005-144557.
Full textMan, Kwan Pok. "Security enhancement on the cryptosystem based on chaotic and elliptic curve cryptography /." access abstract and table of contents access full-text, 2006. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-ee-b21471526a.pdf.
Full textCai, Zhi, and 蔡植. "A study on parameters generation of elliptic curve cryptosystem over finite fields." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31225639.
Full textKultinov, Kirill. "Software Implementations and Applications of Elliptic Curve Cryptography." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514.
Full textArslanian, Samuel Thomas. "An implementation of the El Gamal elliptic curve cryptosystem over a finite field of characteristic P." Fogler Library, University of Maine, 1998. http://www.library.umaine.edu/theses/pdf/ArslanianST1998.pdf.
Full textPoni, Sofia. "Le curve ellittiche in crittografia." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2022. http://amslaurea.unibo.it/25677/.
Full textHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textBooks on the topic "Elliptic curve elgamal cryptosystem"
Martin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.
Full textBook chapters on the topic "Elliptic curve elgamal cryptosystem"
Zheng, Zhiyong. "Elliptic Curve." In Financial Mathematics and Fintech. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0920-7_6.
Full textNitaj, Abderrahmane, Willy Susilo, and Joseph Tonien. "Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem." In Provable Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31919-9_12.
Full textAkishita, Toru, and Tsuyoshi Takagi. "Zero-Value Point Attacks on Elliptic Curve Cryptosystem." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10958513_17.
Full textWong, M. M., M. L. D. Wong, and Ka Lok Man. "Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35606-3_58.
Full textShankar, T. N., G. Sahoo, and S. Niranjan. "Digital Signature of an Image by Elliptic Curve Cryptosystem." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27317-9_35.
Full textChiou, C. W., Y. S. Sun, C. M. Lee, Y. L. Chiu, J. M. Lin, and C. Y. Lee. "Problems on Gaussian Normal Basis Multiplication for Elliptic Curve Cryptosystem." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23207-2_20.
Full textZhang, Fangguo, and Zhuoran Zhang. "ECC$$^2$$: Error Correcting Code and Elliptic Curve Based Cryptosystem." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_17.
Full textKadu, Rakesh K., and Dattatraya S. Adane. "Hardware Implementation of Elliptic Curve Cryptosystem Using Optimized Scalar Multiplication." In Smart Innovation, Systems and Technologies. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0077-0_32.
Full textZheng, Zhiyong, Kun Tian, and Fengxia Liu. "A Generalization of NTRUencrypt." In Financial Mathematics and Fintech. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7644-5_7.
Full textKanda, Guard, Alexander O. A. Antwi, and Kwangki Ryoo. "Hardware Architecture Design of AES Cryptosystem with 163-Bit Elliptic Curve." In Lecture Notes in Electrical Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1328-8_55.
Full textConference papers on the topic "Elliptic curve elgamal cryptosystem"
Yang, Ziyao, and Yuan Liu. "Design and Application of an International Trade Trading Platform Based on ElGamal and Elliptic Curve Cryptography." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10721931.
Full textM. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.
Full textFu Minfeng and Chen Wei. "Elliptic curve cryptosystem ElGamal encryption and transmission scheme." In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccasm.2010.5620105.
Full textWong, Tze Jin, Mohd Rushdan Md Said, Mohamed Othman, and Lee Feng Koo. "A Lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem." In INTERNATIONAL CONFERENCE ON QUANTITATIVE SCIENCES AND ITS APPLICATIONS (ICOQSIA 2014): Proceedings of the 3rd International Conference on Quantitative Sciences and Its Applications. AIP Publishing LLC, 2014. http://dx.doi.org/10.1063/1.4903592.
Full textLee, Narn-Yih, Zih-Ling Chen, and Fu-Kun Chen. "Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem." In 2013 IEEE 37th International Computer Software and Applications Conference Workshops (COMPSACW). IEEE, 2013. http://dx.doi.org/10.1109/compsacw.2013.7.
Full textUdin, Md Nizam, Suhaila Abd Halim, Mohd Idris Jayes, and Hailiza Kamarulhaili. "Application of message embedding technique in ElGamal Elliptic Curve Cryptosystem." In 2012 International Conference on Statistics in Science, Business and Engineering (ICSSBE2012). IEEE, 2012. http://dx.doi.org/10.1109/icssbe.2012.6396578.
Full textRachmawati, Dian, Mohammad Andri Budiman, and Muhammad Ishan Wardhono. "Hybrid Cryptosystem for Image Security by Using Hill Cipher 4x4 and ElGamal Elliptic Curve Algorithm." In 2018 IEEE International Conference on Communication, Networks and Satellite (Comnetsat). IEEE, 2018. http://dx.doi.org/10.1109/comnetsat.2018.8684121.
Full textElhassani, M., A. Chillali, and A. Mouhib. "Elliptic curve and Lattice cryptosystem." In 2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS). IEEE, 2019. http://dx.doi.org/10.1109/isacs48493.2019.9068885.
Full textBin Yu. "Establishement of elliptic curve cryptosystem." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689767.
Full textAli, Sk Subidh, and Ozgur Sinanoglu. "Scan attack on Elliptic Curve Cryptosystem." In 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS). IEEE, 2015. http://dx.doi.org/10.1109/dft.2015.7315146.
Full text