Citation to this article as recorded by
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Nikooghadam, M., M.R. Bonyadi, E. Malekian and A. Zakerolhosseini, 2008. A protocol for digital signature based on the elliptic curve discrete logarithm problem. J. Applied Sci., 8: 1919-1925. CrossRefDirect Link |
Olorunfemi, T.O.S., B.K. Alese, S.O. Falaki and O. Fajuyigbe, 2007. Implementation of elliptic curve digital signature algorithms. J. Software Eng., 1: 1-12. CrossRefDirect Link |
Citation to this article as recorded by
Computer Networks and Inventive Communication Technologies Lecture Notes on Data Engineering and Communications Technologies |
Study of Safe Elliptic Curve Cryptography over Gaussian Integer IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E103.A, Issue 12, 1624, 2020 |
An Improved Digital Signature Protocol to Multi-User Broadcast
Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks
(WSNs) Mathematical and Computational Applications Vol. 23, Issue 2, 17, 2018 |
Elliptic Curve Cryptography over Binary Finite Field GF(2m) Information Technology Journal Vol. 5, Issue 1, 204, 2006 |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
A protocol for digital signature based on the elliptic curve discrete logarithm problem. Journal of Applied Sciences Vol. 8, Issue 10, 1919, 2008 |
Implementation of Elliptic Curve Digital Signature Algorithms Journal of Software Engineering Vol. 1, Issue 1, 1, 2007 |
How to cite this article
Kefa Rabah , 2005. Elliptic Curve ElGamal Encryption and Signature Schemes. Information Technology Journal, 4: 299-306.
DOI: 10.3923/itj.2005.299.306
URL: https://scialert.net/abstract/?doi=itj.2005.299.306
DOI: 10.3923/itj.2005.299.306
URL: https://scialert.net/abstract/?doi=itj.2005.299.306