Search alternatives:
power encryption » power generation (Expand Search)
Showing 1 - 8 results of 8 for search 'power encryption algorithm', query time: 0.04s Refine Results
  1. 1
  2. 2

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…Summary form only given. In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 3

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 4
  5. 5
  6. 6

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Syeda Tayyaba Bukhari (21842078)

    Published 2024
    “…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
  7. 7
  8. 8

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text