Voir la notice de l'article provenant de la source Library of Science
Mots-clés : klucz publiczny, szyfr EIGamal, szyfr blokowy
@article{IJAMCS_2004_14_2_a13,
author = {Ko\'scielny, Cz.},
title = {A new approach to the elgamal encryption scheme},
journal = {International Journal of Applied Mathematics and Computer Science},
pages = {265--267},
publisher = {mathdoc},
volume = {14},
number = {2},
year = {2004},
language = {en},
url = {http://geodesic.mathdoc.fr/item/IJAMCS_2004_14_2_a13/}
}
TY - JOUR AU - Kościelny, Cz. TI - A new approach to the elgamal encryption scheme JO - International Journal of Applied Mathematics and Computer Science PY - 2004 SP - 265 EP - 267 VL - 14 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/IJAMCS_2004_14_2_a13/ LA - en ID - IJAMCS_2004_14_2_a13 ER -
Kościelny, Cz. A new approach to the elgamal encryption scheme. International Journal of Applied Mathematics and Computer Science, Tome 14 (2004) no. 2, pp. 265-267. http://geodesic.mathdoc.fr/item/IJAMCS_2004_14_2_a13/
[1] Kościelny C. (2003): User-friendly ElGamal public-key encryption scheme.—http://www.mapleapps.com/List.asp?CategoryID=6=Cryptography.
[2] Menezes A.J., van Oorschot P.C. and Vanstone S.A. (1998): Handbook of Applied Cryptography.—Boca Raton: CRC Press.
[3] Stinson D.R. (1995): Cryptography — Theory and Practice. — Boca Raton: CRC Press.
[4] Živković M. (1994): Table of primitive binary polynomials, Part II.—Math. Comput., Vol. 63, No. 207, pp. 301–306.