Artykuły w czasopismach na temat „Elliptic curve elgamal cryptosystem”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Elliptic curve elgamal cryptosystem”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Kamthawee, Krissanee, and Bhichate Chiewthanakul. "The Construction of ElGamal over Koblitz Curve." Advanced Materials Research 931-932 (May 2014): 1441–46. http://dx.doi.org/10.4028/www.scientific.net/amr.931-932.1441.
Pełny tekst źródłaIsmail, N. H. M., and M. Y. Misro. "Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem." Malaysian Journal of Mathematical Sciences 16, no. 3 (2022): 483–99. http://dx.doi.org/10.47836/mjms.16.3.06.
Pełny tekst źródłaLuhaib, Qasim Mohsin, and Ruma Kareem K. Ajeena. "Elliptic curve matrices over group ring to improve elliptic curve–discrete logarithm cryptosystems." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 6 (2023): 1699–704. http://dx.doi.org/10.47974/jdmsc-1616.
Pełny tekst źródłaAbdelhakim, Chillali, and M'hammed Boulagouaz. "Methods of encryption keys, example of elliptic curve." Journal of Communications and Computer Engineering 3, no. 1 (2012): 7. http://dx.doi.org/10.20454/jcce.2013.259.
Pełny tekst źródłaWu, Huangwei. "General analysis on essential mathematical principles of elliptic curve cryptography." Theoretical and Natural Science 10, no. 1 (2023): 123–29. http://dx.doi.org/10.54254/2753-8818/10/20230327.
Pełny tekst źródłaSangeetha, V., T. Anupreethi, and Manju Somanath. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal Of Science And Technology 17, no. 20 (2024): 2074–78. http://dx.doi.org/10.17485/ijst/v17i20.1183.
Pełny tekst źródłaV, Sangeetha, Anupreethi T, and Somanath Manju. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal of Science and Technology 17, no. 20 (2024): 2074–78. https://doi.org/10.17485/IJST/v17i20.1183.
Pełny tekst źródłaSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Pełny tekst źródłaPrabhdeep Kaur and Sheetal Kalra. "On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography." Journal of Technology Management for Growing Economies 6, no. 1 (2015): 39–52. http://dx.doi.org/10.15415/jtmge.2015.61004.
Pełny tekst źródłaLopez, Maria Isaura, and Ayad Barsoum. "Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography." International Journal of Cyber Research and Education 4, no. 1 (2022): 1–14. http://dx.doi.org/10.4018/ijcre.309688.
Pełny tekst źródłaLahraoui, Younes, Saiida Lazaar, Youssef Amal, and Abderrahmane Nitaj. "Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance." Cryptography 8, no. 2 (2024): 23. http://dx.doi.org/10.3390/cryptography8020023.
Pełny tekst źródłaDr., C. Porkodi* Dr. R. Arumuganathan. "ELLIPTIC CURVE BASED UNTRACEABLE OFF-LINE ELECTRONIC CASH SYSTEM." Global Journal of Engineering Science and Research Management 6, no. 7 (2019): 25–34. https://doi.org/10.5281/zenodo.3345117.
Pełny tekst źródłaAlsamaraee, Suray, and Ali Salem Ali. "A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3539–50. http://dx.doi.org/10.11591/eei.v11i6.4194.
Pełny tekst źródłaSuray, Alsamaraee, and Salem Ali Ali. "A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3539~3550. https://doi.org/10.11591/eei.v11i6.4194.
Pełny tekst źródłaChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.
Pełny tekst źródłaDr., Joshua J. Tom, Nlerum P. Anebo Dr., Bukola A. Onyekwelu Dr., Wilfred Adigwe, and E. Eyo Richard. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 5 (2023): 25–38. https://doi.org/10.5281/zenodo.8073526.
Pełny tekst źródłaTom, Dr Joshua J., Dr Nlerum P. Anebo, Dr Bukola A. Onyekwelu, Adigwe Wilfred, and Richard E. Eyo. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology 12, no. 5 (2023): 25–38. http://dx.doi.org/10.35940/ijeat.e4153.0612523.
Pełny tekst źródłaAlkfari, Batool Hatem Akar, and Ruma Kareem K. Ajeena. "The Huff curve–ElGamal graphic public key cryptosystem." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 6 (2023): 1753–60. http://dx.doi.org/10.47974/jdmsc-1640.
Pełny tekst źródłaTrung, Mai Manh, Le Phe Do, Do Trung Tuan, et al. "The comparison of several cryptosystems using the elliptic curve: a report." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 5 (2024): 5319. http://dx.doi.org/10.11591/ijece.v14i5.pp5319-5329.
Pełny tekst źródła., Kefa Rabah. "Elliptic Curve ElGamal Encryption and Signature Schemes." Information Technology Journal 4, no. 3 (2005): 299–306. http://dx.doi.org/10.3923/itj.2005.299.306.
Pełny tekst źródłaTrung, Mai Manh, Le Phe Do, Do Trung Tuan, Nguyen Van Tanh, and Ngo Quang Tri. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734. http://dx.doi.org/10.11591/ijece.v13i2.pp1734-1743.
Pełny tekst źródłaDicky, Nofriansyah, Syaref Afzalur, R. Maya Widiarti, Ganefri Ganefri, and Ridwan. "Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Using Elliptic Curve Cryptography (ECC)." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 1 (2018): 352–60. https://doi.org/10.12928/TELKOMNIKA.v16i1.6953.
Pełny tekst źródłaMai, Manh Trung, Phe Do Le, Trung Tuan Do, Van Tanh Nguyen, and Quang Tri Ngo. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734–43. https://doi.org/10.11591/ijece.v13i2.pp1734-1743.
Pełny tekst źródłaWright, Marie A. "The elliptic curve cryptosystem: A synopsis." Network Security 1998, no. 10 (1998): 14–17. http://dx.doi.org/10.1016/s1353-4858(00)87603-5.
Pełny tekst źródłaWong, T. J., L. F. Koo, F. H. Naning, A. F. N. Rasedee, M. M. Magiman, and M. H. A. Sathar. "A CUBIC EL-GAMAL ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE AND ELLIPTIC CURVE." Advances in Mathematics: Scientific Journal 10, no. 11 (2021): 3439–47. http://dx.doi.org/10.37418/amsj.10.11.5.
Pełny tekst źródłaWong, T. J., L. F. Koo, F. H. Naning, A. F. N. Rasedee, M. M. Magiman, and M. H. A. Sathar. "A CUBIC EL-GAMAL ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE AND ELLIPTIC CURVE." Advances in Mathematics: Scientific Journal 10, no. 11 (2021): 3439–47. http://dx.doi.org/10.37418/amsj.10.111.5.
Pełny tekst źródłaChillali, Abdelhakim, Mohammed Elhassani, and Ali Mouhib. "Cryptosystem based on lattice and elliptic curve." Gulf Journal of Mathematics 8, no. 2 (2020): 27–34. http://dx.doi.org/10.56947/gjom.v8i2.362.
Pełny tekst źródłaJin, Shi Guo, and Guang Jiang Wang. "Design of Digital Signature Scheme Based on Elliptic Curve Cryptosystem." Applied Mechanics and Materials 685 (October 2014): 579–82. http://dx.doi.org/10.4028/www.scientific.net/amm.685.579.
Pełny tekst źródłaKakati, Pankaj, and Nayan Jyoti Bordoloi. "A novel approach for Menezes-Vanstone elliptic curve cryptosystem." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 3 (2025): 981–90. https://doi.org/10.47974/jdmsc-2257.
Pełny tekst źródłaObaid, Zahraa Kadhim, and Najlae Falah Hameed Al Saffar. "Image encryption based on elliptic curve cryptosystem." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 2 (2021): 1293. http://dx.doi.org/10.11591/ijece.v11i2.pp1293-1302.
Pełny tekst źródłaSharma, P. L., Shalini Gupta, Kritika Gupta, Ashima, and Sushil Kumar. "Message mapping technique using elliptic curve cryptosystem." Bulletin of Pure & Applied Sciences- Mathematics and Statistics 41e, no. 1 (2022): 104–8. http://dx.doi.org/10.5958/2320-3226.2022.00015.7.
Pełny tekst źródłaAljamaly, Karrar Taher R., and Ruma Kareem K. Ajeena. "The KR-Elliptic Curve Public Key Cryptosystem." Journal of Physics: Conference Series 1879, no. 3 (2021): 032046. http://dx.doi.org/10.1088/1742-6596/1879/3/032046.
Pełny tekst źródłaAli. "Polynomial Interpolation in the Elliptic Curve Cryptosystem." Journal of Mathematics and Statistics 7, no. 4 (2011): 326–31. http://dx.doi.org/10.3844/jmssp.2011.326.331.
Pełny tekst źródłaZahraa, Kadhim Obaidand, and Falah Hameed Al Saffar Najlae. "Image encryption based on elliptic curve cryptosystem." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 2 (2021): 1293–302. https://doi.org/10.11591/ijece.v11i2.pp1293-1302.
Pełny tekst źródłaRavi Kumar, B., A. Chandra Sekhar, and G. Appala Naidu. "A Novel ElGamal Encryption Scheme of Elliptic Curve Cryptography." International Journal of Computer Trends and Technology 20, no. 2 (2015): 70–73. http://dx.doi.org/10.14445/22312803/ijctt-v20p114.
Pełny tekst źródłaKhan, Sarmadullah, and Rafiullah Khan. "Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids." Energies 11, no. 4 (2018): 759. http://dx.doi.org/10.3390/en11040759.
Pełny tekst źródłaZhang, Li Hong, and Shu Qian Chen. "Implementation of Embedded Mobile Device Elliptic Curve Algorithm Fast Generating Algorithm." Advanced Materials Research 694-697 (May 2013): 2599–603. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2599.
Pełny tekst źródłaZhang, Lihong, Shuqian Chen, and Yanglie Fu. "Fast Elliptic Curve Algorithm of Embedded Mobile Equipment." Open Electrical & Electronic Engineering Journal 7, no. 1 (2013): 138–42. http://dx.doi.org/10.2174/1874129001307010138.
Pełny tekst źródłaPutra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.
Pełny tekst źródłaJiang, Hong Bo, and Xin Yu Feng. "Configurable Core of ECC over GF(2m)." Advanced Materials Research 462 (February 2012): 116–22. http://dx.doi.org/10.4028/www.scientific.net/amr.462.116.
Pełny tekst źródłaKim, Suhri, Kisoon Yoon, Jihoon Kwon, Seokhie Hong, and Young-Ho Park. "Efficient Isogeny Computations on Twisted Edwards Curves." Security and Communication Networks 2018 (July 15, 2018): 1–11. http://dx.doi.org/10.1155/2018/5747642.
Pełny tekst źródłaElhamam, Moha Ben Taleb, Abdelali Grini, Abdelhakim Chillali, and Lhoussain El Fadil. "El Gamal Cryptosystem on a Montgomery Curves Over Non Local Ring." WSEAS TRANSACTIONS ON MATHEMATICS 21 (March 2, 2022): 85–89. http://dx.doi.org/10.37394/23206.2022.21.13.
Pełny tekst źródłaKwadwo, Edward, James Ben, and Frimpong Twum. "An Enhanced Elliptic Curve Cryptosystem for Securing Data." International Journal of Computer Applications 182, no. 9 (2018): 47–53. http://dx.doi.org/10.5120/ijca2018917688.
Pełny tekst źródłaAl-Khatib, Mohammad, and Wafaa Saif. "Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem." Computers, Materials & Continua 70, no. 3 (2022): 4847–65. http://dx.doi.org/10.32604/cmc.2022.021483.
Pełny tekst źródłaIsmail, E. S., and W. S. Wan-Daud. "ID-based signature scheme using elliptic curve cryptosystem." Applied Mathematical Sciences 7 (2013): 3615–24. http://dx.doi.org/10.12988/ams.2013.32121.
Pełny tekst źródłaVincent, O. R., O. Folorunso, and A. D. Akinde. "Improving e-payment security using Elliptic Curve Cryptosystem." Electronic Commerce Research 10, no. 1 (2010): 27–41. http://dx.doi.org/10.1007/s10660-010-9047-z.
Pełny tekst źródłaCliment, Joan-Josep, Francisco Ferrández, José-Francisco Vicent, and Antonio Zamora. "A nonlinear elliptic curve cryptosystem based on matrices." Applied Mathematics and Computation 174, no. 1 (2006): 150–64. http://dx.doi.org/10.1016/j.amc.2005.03.032.
Pełny tekst źródłaAKISHITA, T. "Zero-Value Register Attack on Elliptic Curve Cryptosystem." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E88-A, no. 1 (2005): 132–39. http://dx.doi.org/10.1093/ietfec/e88-a.1.132.
Pełny tekst źródłaByrne, Andrew, Francis Crowe, William Peter Marnane, Nicolas Meloni, Arnaud Tisserand, and Emanuel M. Popovici. "SPA resistant elliptic curve cryptosystem using addition chains." International Journal of High Performance Systems Architecture 1, no. 2 (2007): 133. http://dx.doi.org/10.1504/ijhpsa.2007.015399.
Pełny tekst źródłaJayanti, Sravani, K. Chittibabu, and Chandra Sekhar Akkapeddi. "A Cryptosystem of Skewed Affine Cipher of Multiple Keys." ECS Transactions 107, no. 1 (2022): 15071–80. http://dx.doi.org/10.1149/10701.15071ecst.
Pełny tekst źródła