Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
M Thangavel, P Varalakshmi - Cluster Computing, 2018 - Springer
Cloud computing enables the access of the resources such as network hardware's, storage,
applications and services that are configurable based on the demand in a network …
applications and services that are configurable based on the demand in a network …
Analysis review on public key cryptography algorithms
This paper presents several Public Key Cryptography (PKC) algorithms based on the
perspective of researchers' effort since it was invented in the last four decades. The …
perspective of researchers' effort since it was invented in the last four decades. The …
Improved ElGamal cryptosystem for secure data transfer in IoT networks
M Mohan, MK Kavithadevi - … conference on I-SMAC (IoT in …, 2020 - ieeexplore.ieee.org
ElGamal cryptosystem possess many technical challenges such as encryption of large
messages, integrity and authentication of data, non-malleability, semantic security etc. This …
messages, integrity and authentication of data, non-malleability, semantic security etc. This …
Discrete sliding mode control for chaos synchronization and its application to an improved El-Gamal cryptosystem
PY Wan, TL Liao, JJ Yan, HH Tsai - Symmetry, 2019 - mdpi.com
This paper is concerned with the design of an improved El-Gamal cryptosystem based on
chaos synchronization. The El-Gamal cryptosystem is an asymmetric encryption algorithm …
chaos synchronization. The El-Gamal cryptosystem is an asymmetric encryption algorithm …
An efficient ElGamal cryptosystem scheme
HI Hussein, WM Abduallah - International Journal of Computers …, 2021 - Taylor & Francis
ElGamal Cryptosystem (EC) is a non-deterministic scheme which produces different outputs
for the same input, making the cryptosystem more secure. On the other hand, the efficiency …
for the same input, making the cryptosystem more secure. On the other hand, the efficiency …
ElGamal algorithm for encryption of data transmission
Z Wu, D Su, G Ding - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
With continuous development of network technology, more and more attacks on system from
Internet have become more automated and caused greater damage and loss. It is important …
Internet have become more automated and caused greater damage and loss. It is important …
Comparative study of luc, elgamal and rsa algorithms in encoding texts
PP Sari, EB Nababan, M Zarlis - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Cryptography has an important role in the process of data security. One of the benefits of
applying cryptography is creating a sense of security in hiding data without having to doubt …
applying cryptography is creating a sense of security in hiding data without having to doubt …
Modification of chipertext Elgamal algorithm using split merge
R Asri, MKM Nasution… - Journal of Physics …, 2019 - iopscience.iop.org
The development of increasingly sophisticated technology with more intensive use of
computers facilitates human work activities, so that security problems arise that misuse …
computers facilitates human work activities, so that security problems arise that misuse …
A public key cryptosystem using cyclotomic matrices
Confidentiality and Integrity are two paramount objectives in the evaluation of information
and communication technology. In this chapter, we propose an arithmetic approach for …
and communication technology. In this chapter, we propose an arithmetic approach for …
Review on public key cryptography scheme-based performance metrics
Cryptography is a method used to establish secure data communication. The goal of
cryptography is to send data to satisfy the criteria of confidentiality, data integrity …
cryptography is to send data to satisfy the criteria of confidentiality, data integrity …