{"id":"https://openalex.org/W1997684792","doi":"https://doi.org/10.1109/iceei.2011.6021779","title":"The enhancement of computation technique by combining RSA and El-Gamal Cryptosystems","display_name":"The enhancement of computation technique by combining RSA and El-Gamal Cryptosystems","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W1997684792","doi":"https://doi.org/10.1109/iceei.2011.6021779","mag":"1997684792"},"language":"en","primary_location":{"id":"doi:10.1109/iceei.2011.6021779","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceei.2011.6021779","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Electrical Engineering and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039265296","display_name":"Jassim Mohammed Ahmed","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Jassim Mohammed Ahmed","raw_affiliation_strings":["Faculty of Technology and Information Science, University Kebangsan Malaysia, Bangi, Selangor Darul Ehsan, Malaysia","School of Computer Science, Faculty of Technology and Information Science, University Kebangsan Malaysia, 43600 Bangi, Selangor Darul Ehsan, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Technology and Information Science, University Kebangsan Malaysia, Bangi, Selangor Darul Ehsan, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"School of Computer Science, Faculty of Technology and Information Science, University Kebangsan Malaysia, 43600 Bangi, Selangor Darul Ehsan, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112999189","display_name":"Zulkarnain Md Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Zulkarnain Md Ali","raw_affiliation_strings":["Faculty of Technology and Information Science, University Kebangsan Malaysia, Bangi, Selangor Darul Ehsan, Malaysia","School of Computer Science, Faculty of Technology and Information Science, University Kebangsan Malaysia, 43600 Bangi, Selangor Darul Ehsan, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Technology and Information Science, University Kebangsan Malaysia, Bangi, Selangor Darul Ehsan, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"School of Computer Science, Faculty of Technology and Information Science, University Kebangsan Malaysia, 43600 Bangi, Selangor Darul Ehsan, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039265296"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":0.39173682,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.70531638,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.8940905332565308},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.7506887912750244},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.6913658976554871},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.652601957321167},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5899228453636169},{"id":"https://openalex.org/keywords/integer-factorization","display_name":"Integer factorization","score":0.5524083375930786},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4820595681667328},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.448646605014801},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4207606613636017},{"id":"https://openalex.org/keywords/integer","display_name":"Integer (computer science)","score":0.4164767861366272},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2982853651046753},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2642532289028168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22064009308815002}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.8940905332565308},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.7506887912750244},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.6913658976554871},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.652601957321167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5899228453636169},{"id":"https://openalex.org/C119677069","wikidata":"https://www.wikidata.org/wiki/Q4846249","display_name":"Integer factorization","level":4,"score":0.5524083375930786},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4820595681667328},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.448646605014801},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4207606613636017},{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.4164767861366272},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2982853651046753},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2642532289028168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22064009308815002},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iceei.2011.6021779","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceei.2011.6021779","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Electrical Engineering and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1490371707","https://openalex.org/W1568839073","https://openalex.org/W1996360405","https://openalex.org/W2108834246","https://openalex.org/W2120747655","https://openalex.org/W2170671699","https://openalex.org/W2258017266","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2018555057","https://openalex.org/W2154571469","https://openalex.org/W2157130609","https://openalex.org/W2771272152","https://openalex.org/W1984000695","https://openalex.org/W4387697456","https://openalex.org/W4300791789","https://openalex.org/W98134122","https://openalex.org/W2363815311","https://openalex.org/W807354026"],"abstract_inverted_index":{"Cryptography":[0],"addresses":[1],"the":[2,23,27,30,41,47,60,81,91,94],"necessary":[3],"elements":[4],"for":[5,74],"secure":[6],"communication":[7],"such":[8],"as":[9],"privacy,":[10],"confidentiality,":[11],"key":[12],"exchange,":[13],"authentication,":[14],"and":[15,32,104],"non-repudiation.":[16],"This":[17,56],"paper":[18],"proposes":[19],"a":[20,69,89],"model":[21,57],"satisfies":[22],"security":[24],"based":[25,77],"on":[26,40,51,59,78],"combination":[28],"of":[29,62,72,80,83,93],"RSA":[31,36,105],"El-Gamal":[33,48,102],"Cryptosystems.":[34],"The":[35],"Cryptosystem":[37,49],"is":[38,97],"depends":[39,50],"Integer":[42],"Factorization":[43],"Problem":[44,54],"(IFP),":[45],"while":[46],"Discrete":[52],"Logarithm":[53],"(DLP).":[55],"works":[58],"basis":[61],"merging":[63],"between":[64],"IFP":[65],"with":[66],"DLP":[67],"give":[68],"good":[70],"speed":[71],"computation":[73,92],"asymmetric":[75],"cryptosystem":[76],"difficulties":[79],"solutions":[82],"two":[84],"famous":[85],"hard":[86],"problems.":[87],"As":[88],"result,":[90],"proposed":[95],"system":[96],"more":[98],"efficient":[99],"compared":[100],"to":[101],"algorithm":[103],"algorithm.":[106]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
