-
1
-
2
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…Summary form only given. In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
3
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
4
-
5
-
6
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …"
-
7
-
8
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
منشور في 2021"…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
احصل على النص الكامل