Voir la notice de l'article provenant de la source Library of Science
@article{IJAMCS_2004_14_2_a13, author = {Ko\'scielny, Cz.}, title = {A new approach to the elgamal encryption scheme}, journal = {International Journal of Applied Mathematics and Computer Science}, pages = {265--267}, publisher = {mathdoc}, volume = {14}, number = {2}, year = {2004}, language = {en}, url = {http://geodesic.mathdoc.fr/item/IJAMCS_2004_14_2_a13/} }
TY - JOUR AU - Kościelny, Cz. TI - A new approach to the elgamal encryption scheme JO - International Journal of Applied Mathematics and Computer Science PY - 2004 SP - 265 EP - 267 VL - 14 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/IJAMCS_2004_14_2_a13/ LA - en ID - IJAMCS_2004_14_2_a13 ER -
Kościelny, Cz. A new approach to the elgamal encryption scheme. International Journal of Applied Mathematics and Computer Science, Tome 14 (2004) no. 2, pp. 265-267. http://geodesic.mathdoc.fr/item/IJAMCS_2004_14_2_a13/
[1] Kościelny C. (2003): User-friendly ElGamal public-key encryption scheme.—http://www.mapleapps.com/List.asp?CategoryID=6=Cryptography.
[2] Menezes A.J., van Oorschot P.C. and Vanstone S.A. (1998): Handbook of Applied Cryptography.—Boca Raton: CRC Press.
[3] Stinson D.R. (1995): Cryptography — Theory and Practice. — Boca Raton: CRC Press.
[4] Živković M. (1994): Table of primitive binary polynomials, Part II.—Math. Comput., Vol. 63, No. 207, pp. 301–306.