Journal articles on the topic 'Elliptic curve elgamal cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Elliptic curve elgamal cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kamthawee, Krissanee, and Bhichate Chiewthanakul. "The Construction of ElGamal over Koblitz Curve." Advanced Materials Research 931-932 (May 2014): 1441–46. http://dx.doi.org/10.4028/www.scientific.net/amr.931-932.1441.
Full textIsmail, N. H. M., and M. Y. Misro. "Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem." Malaysian Journal of Mathematical Sciences 16, no. 3 (2022): 483–99. http://dx.doi.org/10.47836/mjms.16.3.06.
Full textLuhaib, Qasim Mohsin, and Ruma Kareem K. Ajeena. "Elliptic curve matrices over group ring to improve elliptic curve–discrete logarithm cryptosystems." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 6 (2023): 1699–704. http://dx.doi.org/10.47974/jdmsc-1616.
Full textAbdelhakim, Chillali, and M'hammed Boulagouaz. "Methods of encryption keys, example of elliptic curve." Journal of Communications and Computer Engineering 3, no. 1 (2012): 7. http://dx.doi.org/10.20454/jcce.2013.259.
Full textWu, Huangwei. "General analysis on essential mathematical principles of elliptic curve cryptography." Theoretical and Natural Science 10, no. 1 (2023): 123–29. http://dx.doi.org/10.54254/2753-8818/10/20230327.
Full textSangeetha, V., T. Anupreethi, and Manju Somanath. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal Of Science And Technology 17, no. 20 (2024): 2074–78. http://dx.doi.org/10.17485/ijst/v17i20.1183.
Full textV, Sangeetha, Anupreethi T, and Somanath Manju. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal of Science and Technology 17, no. 20 (2024): 2074–78. https://doi.org/10.17485/IJST/v17i20.1183.
Full textSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Full textPrabhdeep Kaur and Sheetal Kalra. "On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography." Journal of Technology Management for Growing Economies 6, no. 1 (2015): 39–52. http://dx.doi.org/10.15415/jtmge.2015.61004.
Full textLopez, Maria Isaura, and Ayad Barsoum. "Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography." International Journal of Cyber Research and Education 4, no. 1 (2022): 1–14. http://dx.doi.org/10.4018/ijcre.309688.
Full textLahraoui, Younes, Saiida Lazaar, Youssef Amal, and Abderrahmane Nitaj. "Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance." Cryptography 8, no. 2 (2024): 23. http://dx.doi.org/10.3390/cryptography8020023.
Full textDr., C. Porkodi* Dr. R. Arumuganathan. "ELLIPTIC CURVE BASED UNTRACEABLE OFF-LINE ELECTRONIC CASH SYSTEM." Global Journal of Engineering Science and Research Management 6, no. 7 (2019): 25–34. https://doi.org/10.5281/zenodo.3345117.
Full textAlsamaraee, Suray, and Ali Salem Ali. "A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3539–50. http://dx.doi.org/10.11591/eei.v11i6.4194.
Full textSuray, Alsamaraee, and Salem Ali Ali. "A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3539~3550. https://doi.org/10.11591/eei.v11i6.4194.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textDr., Joshua J. Tom, Nlerum P. Anebo Dr., Bukola A. Onyekwelu Dr., Wilfred Adigwe, and E. Eyo Richard. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 5 (2023): 25–38. https://doi.org/10.5281/zenodo.8073526.
Full textTom, Dr Joshua J., Dr Nlerum P. Anebo, Dr Bukola A. Onyekwelu, Adigwe Wilfred, and Richard E. Eyo. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology 12, no. 5 (2023): 25–38. http://dx.doi.org/10.35940/ijeat.e4153.0612523.
Full textAlkfari, Batool Hatem Akar, and Ruma Kareem K. Ajeena. "The Huff curve–ElGamal graphic public key cryptosystem." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 6 (2023): 1753–60. http://dx.doi.org/10.47974/jdmsc-1640.
Full textTrung, Mai Manh, Le Phe Do, Do Trung Tuan, et al. "The comparison of several cryptosystems using the elliptic curve: a report." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 5 (2024): 5319. http://dx.doi.org/10.11591/ijece.v14i5.pp5319-5329.
Full text., Kefa Rabah. "Elliptic Curve ElGamal Encryption and Signature Schemes." Information Technology Journal 4, no. 3 (2005): 299–306. http://dx.doi.org/10.3923/itj.2005.299.306.
Full textTrung, Mai Manh, Le Phe Do, Do Trung Tuan, Nguyen Van Tanh, and Ngo Quang Tri. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734. http://dx.doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textDicky, Nofriansyah, Syaref Afzalur, R. Maya Widiarti, Ganefri Ganefri, and Ridwan. "Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Using Elliptic Curve Cryptography (ECC)." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 1 (2018): 352–60. https://doi.org/10.12928/TELKOMNIKA.v16i1.6953.
Full textMai, Manh Trung, Phe Do Le, Trung Tuan Do, Van Tanh Nguyen, and Quang Tri Ngo. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734–43. https://doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textWright, Marie A. "The elliptic curve cryptosystem: A synopsis." Network Security 1998, no. 10 (1998): 14–17. http://dx.doi.org/10.1016/s1353-4858(00)87603-5.
Full textWong, T. J., L. F. Koo, F. H. Naning, A. F. N. Rasedee, M. M. Magiman, and M. H. A. Sathar. "A CUBIC EL-GAMAL ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE AND ELLIPTIC CURVE." Advances in Mathematics: Scientific Journal 10, no. 11 (2021): 3439–47. http://dx.doi.org/10.37418/amsj.10.11.5.
Full textWong, T. J., L. F. Koo, F. H. Naning, A. F. N. Rasedee, M. M. Magiman, and M. H. A. Sathar. "A CUBIC EL-GAMAL ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE AND ELLIPTIC CURVE." Advances in Mathematics: Scientific Journal 10, no. 11 (2021): 3439–47. http://dx.doi.org/10.37418/amsj.10.111.5.
Full textChillali, Abdelhakim, Mohammed Elhassani, and Ali Mouhib. "Cryptosystem based on lattice and elliptic curve." Gulf Journal of Mathematics 8, no. 2 (2020): 27–34. http://dx.doi.org/10.56947/gjom.v8i2.362.
Full textJin, Shi Guo, and Guang Jiang Wang. "Design of Digital Signature Scheme Based on Elliptic Curve Cryptosystem." Applied Mechanics and Materials 685 (October 2014): 579–82. http://dx.doi.org/10.4028/www.scientific.net/amm.685.579.
Full textKakati, Pankaj, and Nayan Jyoti Bordoloi. "A novel approach for Menezes-Vanstone elliptic curve cryptosystem." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 3 (2025): 981–90. https://doi.org/10.47974/jdmsc-2257.
Full textObaid, Zahraa Kadhim, and Najlae Falah Hameed Al Saffar. "Image encryption based on elliptic curve cryptosystem." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 2 (2021): 1293. http://dx.doi.org/10.11591/ijece.v11i2.pp1293-1302.
Full textSharma, P. L., Shalini Gupta, Kritika Gupta, Ashima, and Sushil Kumar. "Message mapping technique using elliptic curve cryptosystem." Bulletin of Pure & Applied Sciences- Mathematics and Statistics 41e, no. 1 (2022): 104–8. http://dx.doi.org/10.5958/2320-3226.2022.00015.7.
Full textAljamaly, Karrar Taher R., and Ruma Kareem K. Ajeena. "The KR-Elliptic Curve Public Key Cryptosystem." Journal of Physics: Conference Series 1879, no. 3 (2021): 032046. http://dx.doi.org/10.1088/1742-6596/1879/3/032046.
Full textAli. "Polynomial Interpolation in the Elliptic Curve Cryptosystem." Journal of Mathematics and Statistics 7, no. 4 (2011): 326–31. http://dx.doi.org/10.3844/jmssp.2011.326.331.
Full textZahraa, Kadhim Obaidand, and Falah Hameed Al Saffar Najlae. "Image encryption based on elliptic curve cryptosystem." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 2 (2021): 1293–302. https://doi.org/10.11591/ijece.v11i2.pp1293-1302.
Full textRavi Kumar, B., A. Chandra Sekhar, and G. Appala Naidu. "A Novel ElGamal Encryption Scheme of Elliptic Curve Cryptography." International Journal of Computer Trends and Technology 20, no. 2 (2015): 70–73. http://dx.doi.org/10.14445/22312803/ijctt-v20p114.
Full textKhan, Sarmadullah, and Rafiullah Khan. "Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids." Energies 11, no. 4 (2018): 759. http://dx.doi.org/10.3390/en11040759.
Full textZhang, Li Hong, and Shu Qian Chen. "Implementation of Embedded Mobile Device Elliptic Curve Algorithm Fast Generating Algorithm." Advanced Materials Research 694-697 (May 2013): 2599–603. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2599.
Full textZhang, Lihong, Shuqian Chen, and Yanglie Fu. "Fast Elliptic Curve Algorithm of Embedded Mobile Equipment." Open Electrical & Electronic Engineering Journal 7, no. 1 (2013): 138–42. http://dx.doi.org/10.2174/1874129001307010138.
Full textPutra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.
Full textJiang, Hong Bo, and Xin Yu Feng. "Configurable Core of ECC over GF(2m)." Advanced Materials Research 462 (February 2012): 116–22. http://dx.doi.org/10.4028/www.scientific.net/amr.462.116.
Full textKim, Suhri, Kisoon Yoon, Jihoon Kwon, Seokhie Hong, and Young-Ho Park. "Efficient Isogeny Computations on Twisted Edwards Curves." Security and Communication Networks 2018 (July 15, 2018): 1–11. http://dx.doi.org/10.1155/2018/5747642.
Full textElhamam, Moha Ben Taleb, Abdelali Grini, Abdelhakim Chillali, and Lhoussain El Fadil. "El Gamal Cryptosystem on a Montgomery Curves Over Non Local Ring." WSEAS TRANSACTIONS ON MATHEMATICS 21 (March 2, 2022): 85–89. http://dx.doi.org/10.37394/23206.2022.21.13.
Full textKwadwo, Edward, James Ben, and Frimpong Twum. "An Enhanced Elliptic Curve Cryptosystem for Securing Data." International Journal of Computer Applications 182, no. 9 (2018): 47–53. http://dx.doi.org/10.5120/ijca2018917688.
Full textAl-Khatib, Mohammad, and Wafaa Saif. "Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem." Computers, Materials & Continua 70, no. 3 (2022): 4847–65. http://dx.doi.org/10.32604/cmc.2022.021483.
Full textIsmail, E. S., and W. S. Wan-Daud. "ID-based signature scheme using elliptic curve cryptosystem." Applied Mathematical Sciences 7 (2013): 3615–24. http://dx.doi.org/10.12988/ams.2013.32121.
Full textVincent, O. R., O. Folorunso, and A. D. Akinde. "Improving e-payment security using Elliptic Curve Cryptosystem." Electronic Commerce Research 10, no. 1 (2010): 27–41. http://dx.doi.org/10.1007/s10660-010-9047-z.
Full textCliment, Joan-Josep, Francisco Ferrández, José-Francisco Vicent, and Antonio Zamora. "A nonlinear elliptic curve cryptosystem based on matrices." Applied Mathematics and Computation 174, no. 1 (2006): 150–64. http://dx.doi.org/10.1016/j.amc.2005.03.032.
Full textAKISHITA, T. "Zero-Value Register Attack on Elliptic Curve Cryptosystem." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E88-A, no. 1 (2005): 132–39. http://dx.doi.org/10.1093/ietfec/e88-a.1.132.
Full textByrne, Andrew, Francis Crowe, William Peter Marnane, Nicolas Meloni, Arnaud Tisserand, and Emanuel M. Popovici. "SPA resistant elliptic curve cryptosystem using addition chains." International Journal of High Performance Systems Architecture 1, no. 2 (2007): 133. http://dx.doi.org/10.1504/ijhpsa.2007.015399.
Full textJayanti, Sravani, K. Chittibabu, and Chandra Sekhar Akkapeddi. "A Cryptosystem of Skewed Affine Cipher of Multiple Keys." ECS Transactions 107, no. 1 (2022): 15071–80. http://dx.doi.org/10.1149/10701.15071ecst.
Full text