dc.contributor.author |
Haraty, Ramzi A. |
|
dc.contributor.author |
El-Kassar, A. N. |
|
dc.contributor.author |
Otrok, Hadi |
|
dc.date.accessioned |
2018-03-22T12:07:05Z |
|
dc.date.available |
2018-03-22T12:07:05Z |
|
dc.date.copyright |
2003 |
en_US |
dc.date.issued |
2018-03-22 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/7253 |
en_US |
dc.language.iso |
en |
en_US |
dc.title |
A Comparative Study of Elgamal Based Cryptographic Algorithms |
en_US |
dc.type |
Article |
en_US |
dc.description.version |
Published |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.school |
SOB |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.idnumber |
199529190 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.relation.journal |
Journal of Theoretical and Applied Computing |
en_US |
dc.journal.volume |
12 |
en_US |
dc.journal.issue |
1 |
en_US |
dc.keywords |
ElGamal cryptosystem |
en_US |
dc.keywords |
Testing and evaluation |
en_US |
dc.identifier.ctation |
Haraty, R. A., Otrok, H., & El-Kassar, A. N. (2003). A Comparative Study of Elgamal Based Cryptographic Algorithms. Journal of Theoretical and Applied Computing, 12 (1). |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.author.email |
abdulnasser.kassar@lau.edu.lb |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-8423-8723 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |