2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TC 2020
DOI: 10.1109/tcset49122.2020.235572
|View full text |Cite
|
Sign up to set email alerts
|

Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Hybrid combination of ElGamal, AES and RSA for the cryptosystems [22] and ElGamal with Hill Cypher p-ISSN: 2621-8070 e-ISSN: 2686-3219 4x4 for image security [23] were detected. The use of ElGamal can be found during the vector-module method for the radio [24], [36].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Hybrid combination of ElGamal, AES and RSA for the cryptosystems [22] and ElGamal with Hill Cypher p-ISSN: 2621-8070 e-ISSN: 2686-3219 4x4 for image security [23] were detected. The use of ElGamal can be found during the vector-module method for the radio [24], [36].…”
Section: Discussionmentioning
confidence: 99%
“…ElGamal's algorithmic scheme requires a pair of keys to be used for the encryption and decryption process. For the Encryption process, it is raised from the values p, g and y (is a public key) while the decryption key consists of the value x (private), p. However, the encryption process time is longer than the decryption time due to mathematical calculations in the encryption process [22], [24], [25]. The steps and requirements that must be met for key generation are as follows: 1.…”
Section: Elgamal Cryptographic Algorithmmentioning
confidence: 99%