Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud

M Thangavel, P Varalakshmi - Cluster Computing, 2018 - Springer
Cloud computing enables the access of the resources such as network hardware's, storage,
applications and services that are configurable based on the demand in a network …

Analysis review on public key cryptography algorithms

JI Ahmad, R Din, M Ahmad… - Indones. J. Electr. Eng …, 2018 - garuda.kemdikbud.go.id
This paper presents several Public Key Cryptography (PKC) algorithms based on the
perspective of researchers' effort since it was invented in the last four decades. The …

Improved ElGamal cryptosystem for secure data transfer in IoT networks

M Mohan, MK Kavithadevi - … conference on I-SMAC (IoT in …, 2020 - ieeexplore.ieee.org
ElGamal cryptosystem possess many technical challenges such as encryption of large
messages, integrity and authentication of data, non-malleability, semantic security etc. This …

Discrete sliding mode control for chaos synchronization and its application to an improved El-Gamal cryptosystem

PY Wan, TL Liao, JJ Yan, HH Tsai - Symmetry, 2019 - mdpi.com
This paper is concerned with the design of an improved El-Gamal cryptosystem based on
chaos synchronization. The El-Gamal cryptosystem is an asymmetric encryption algorithm …

An efficient ElGamal cryptosystem scheme

HI Hussein, WM Abduallah - International Journal of Computers …, 2021 - Taylor & Francis
ElGamal Cryptosystem (EC) is a non-deterministic scheme which produces different outputs
for the same input, making the cryptosystem more secure. On the other hand, the efficiency …

ElGamal algorithm for encryption of data transmission

Z Wu, D Su, G Ding - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
With continuous development of network technology, more and more attacks on system from
Internet have become more automated and caused greater damage and loss. It is important …

Comparative study of luc, elgamal and rsa algorithms in encoding texts

PP Sari, EB Nababan, M Zarlis - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Cryptography has an important role in the process of data security. One of the benefits of
applying cryptography is creating a sense of security in hiding data without having to doubt …

Modification of chipertext Elgamal algorithm using split merge

R Asri, MKM Nasution… - Journal of Physics …, 2019 - iopscience.iop.org
The development of increasingly sophisticated technology with more intensive use of
computers facilitates human work activities, so that security problems arise that misuse …

A public key cryptosystem using cyclotomic matrices

MH Ahmed, J Tanti, S Pushp - Coding Theory-Recent Advances …, 2021 - books.google.com
Confidentiality and Integrity are two paramount objectives in the evaluation of information
and communication technology. In this chapter, we propose an arithmetic approach for …

Review on public key cryptography scheme-based performance metrics

JI Ahmad, R Din, M Ahmad - Indonesian Journal of Electrical …, 2018 - dsgate.uum.edu.my
Cryptography is a method used to establish secure data communication. The goal of
cryptography is to send data to satisfy the criteria of confidentiality, data integrity …