2014 World Congress on Computer Applications and Information Systems (WCCAIS) 2014
DOI: 10.1109/wccais.2014.6916627
|View full text |Cite
|
Sign up to set email alerts
|

Extension and application of El-Gamal encryption scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…This setup empowers anyone to encrypt messages using the recipient's public key, while only the recipient, holding the corresponding private key, can decrypt them. Its versatile applications span secure communication (e.g., emails and financial transactions), digital signatures (verification of document authenticity), key management (secure key distribution without divulging secrets), and secure authentication methods (e.g., SSH and SSL/TLS protocols for web browsing) [22][23][24][25][26]. Asymmetric encryption encompasses a spectrum of algorithms and methods, each with unique strengths and applications.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…This setup empowers anyone to encrypt messages using the recipient's public key, while only the recipient, holding the corresponding private key, can decrypt them. Its versatile applications span secure communication (e.g., emails and financial transactions), digital signatures (verification of document authenticity), key management (secure key distribution without divulging secrets), and secure authentication methods (e.g., SSH and SSL/TLS protocols for web browsing) [22][23][24][25][26]. Asymmetric encryption encompasses a spectrum of algorithms and methods, each with unique strengths and applications.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…Additionally, the Digital Signature Algorithm (DSA), rooted in modular arithmetic and discrete logarithms, is widely recognized for creating digital signatures. Noteworthy variants include ECDSA (Elliptic Curve Digital Signature Algorithm) [23,27], ElGamal (ElGamal Encryption Algorithm) [24], and ECDH (Elliptic Curve Diffie-Hellman) [26].…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…Each move is marked cryptographically by other miners who have a record of the entire transaction history in a blockchain. This renders time records that cannot be altered one by one safe, synchronized, and collective [20]. Moreover, blockchain technology is considered to be IT, and can be used in the applications, industry and industrial industries.…”
Section: Blockchain In Cloud Forensicsmentioning
confidence: 99%
“…Symmetric and asymmetric are widely accepted types of cryptography [4] in which symmetric (also called symmetric key cryptography) is focused towards ensuring secure communication between sender and receiver by using same secret key, whereas asymmetric cryptography (also called public key cryptography) secures communication by using public and private keys [5], [6]. Private key is hold individually in communication while public key is known to everyone due to public nature.…”
Section: Introductionmentioning
confidence: 99%