{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T04:43:22Z","timestamp":1777092202203,"version":"3.51.4"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T00:00:00Z","timestamp":1511308800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10586-017-1368-4","type":"journal-article","created":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T10:47:48Z","timestamp":1511347668000},"page":"1411-1437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2510-8857","authenticated-orcid":false,"given":"M.","family":"Thangavel","sequence":"first","affiliation":[]},{"given":"P.","family":"Varalakshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"1368_CR1","unstructured":"Pant, V., Kumar, A.: DNA cryptography an new approach to secure cloud data. Int. J. Sci. Eng. Res. 7(6) (2016)"},{"key":"1368_CR2","doi-asserted-by":"crossref","unstructured":"Arockiam, L., Monikandan, S.: Efficient cloud storage confidentiality to ensure data security. In: IEEE International Conference on Computer Communication and Informatics (ICCCI) (2014)","DOI":"10.1109\/ICCCI.2014.6921762"},{"key":"1368_CR3","doi-asserted-by":"crossref","unstructured":"Chandramouli, R., Iorga, M., Chokhani, S.: Cryptographic Key Management Issues & Challenges in Cloud Services. National Institute of Standards and Technology. U.S, Department of Commerce (2013)","DOI":"10.6028\/NIST.IR.7956"},{"key":"1368_CR4","unstructured":"European Payment Council: Guidelines on Cryptographic Algorithms Usage and Key Management. https:\/\/www.europeanpaymentscouncil.eu\/document-library\/guidance-documents\/guidelines-cryptographic-algorithms-usage-and-key-management"},{"key":"1368_CR5","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L Adleman","year":"1994","unstructured":"Adleman, L.: Molecular computation of solutions to combinatorial problems. Science 266, 1021\u20131024 (1994)","journal-title":"Science"},{"key":"1368_CR6","doi-asserted-by":"crossref","unstructured":"Jain, S., Bhatnagar, V.: A novel DNA sequence dictionary method for securing data in DNA using spiral approach and framework of DNA cryptography. In: IEEE, ICAETR, pp. 1\u20135 (2014)","DOI":"10.1109\/ICAETR.2014.7012924"},{"key":"1368_CR7","doi-asserted-by":"crossref","unstructured":"Ubaidur Rahman, N.H., Balamurugan, C., Mariappan, R.: A novel DNA computing based encryption and decryption algorithm. In: Proceedia Computer Science, International Conference on Information and Communication Technologies, pp. 463 \u2013 475 (2015)","DOI":"10.1016\/j.procs.2015.02.045"},{"key":"1368_CR8","unstructured":"Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Pearson Education (2013)"},{"key":"1368_CR9","unstructured":"Agarwala, A., Saravanan, R.: A public key cryptosystem based on number theory. 978-1-4673-0255-5\/12, IEEE (2012)"},{"issue":"4","key":"1368_CR10","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1368_CR11","unstructured":"Boneh, D., Joux, A., Nguyen, P.: Breaking plain ElGamal and plain RSA encryption. https:\/\/www-almasty.lip6.fr\/~joux\/pages\/papers\/PlainRSA.pdf"},{"key":"1368_CR12","unstructured":"Bryce, D.A.: Implementing several attacks on plain ElGamal encryption. http:\/\/lib.dr.iastate.edu\/cgi\/viewcontent.cgi?article=2577&context=etd"},{"key":"1368_CR13","volume-title":"Introduction to Modern Cryptography (Chapter 9)","author":"J Katz","year":"2016","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapter 9), 2nd edn. CRC Press, Boca Raton (2016)","edition":"2"},{"key":"1368_CR14","doi-asserted-by":"crossref","unstructured":"McCurley, K.: The discrete logarithm problem. In: Proceedings of Symposia in Applied Mathematics, vol. 42 (1990)","DOI":"10.1090\/psapm\/042\/1095551"},{"issue":"2","key":"1368_CR15","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/69.991728","volume":"14","author":"M-S Hwang","year":"2002","unstructured":"Hwang, M.-S., Chang, C.-C., Hwang, K.-F.: An ElGamal-like cryptosystem for enciphering large messages. IEEE Trans. Knowl. Data Eng. 14(2), 445\u2013446 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"1368_CR16","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"1368_CR17","unstructured":"Mohit, P., Biswas, G.P.: Design of ElGamal PKC for encryption of large messages. In: INDIACom, International Conference. IEEE (2015)"},{"key":"1368_CR18","doi-asserted-by":"crossref","unstructured":"Sharma, P., Sharma, S, Dhakar, R.S.: Modified elgamal cryptosystem algorithm (MECA). In: International Conference on Computer & Communication Technology, pp. 439\u2013443 (2011)","DOI":"10.1109\/ICCCT.2011.6075141"},{"key":"1368_CR19","unstructured":"Asbullah, M.A., Ariffin, M.R.K.: A proposed CCA-secure encryption on an ElGamal variant. In: 7th International Conference on Computing and Convergence Technology (ICCCT), pp. 499\u2013503 (2012)"},{"key":"1368_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, M.T., Nguyen, B.: Some hybrid crypto systems constructed on discrete logarithm problem. In: ATC, International Conference. IEEE (2015)","DOI":"10.1109\/ATC.2014.7043389"},{"issue":"2","key":"1368_CR21","first-page":"141","volume":"14","author":"HR Hashim","year":"2014","unstructured":"Hashim, H.R., Neamaa, I.A.: Image encryption and decryption in a modification of ElGamal cryptosystem in MATLAB. Int. J. Sci. 14(2), 141\u2013147 (2014)","journal-title":"Int. J. Sci."},{"key":"1368_CR22","doi-asserted-by":"crossref","unstructured":"Alam, K., Alam, K.R., Faruq, O., Morimoto, Y.: A comparison between RSA and Elgamal based untraceable blind signature schemes. In: NSysS, International Conference. IEEE (2016)","DOI":"10.1109\/NSysS.2016.7400705"},{"key":"1368_CR23","unstructured":"Prajapati, A., Barkha, P.: Implementation of DNA cryptography in cloud computing and using socket programming. In: ICCCI. IEEE (2016)"},{"issue":"2","key":"1368_CR24","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"2","key":"1368_CR25","first-page":"138","volume":"8","author":"M Malhotra","year":"2014","unstructured":"Malhotra, M.: A new encryption scheme based on enhanced RSA and ElGamal. Int. J. Emerg. Technol. Comput. Appl. Sci. (IJETCAS) 8(2), 138\u2013142 (2014)","journal-title":"Int. J. Emerg. Technol. Comput. Appl. Sci. (IJETCAS)"},{"issue":"8","key":"1368_CR26","first-page":"289","volume":"2","author":"K Madhur","year":"2012","unstructured":"Madhur, K., Yadav, J.S., Vijay, A.: Modified ElGamal over RSA digital signature algorithm (MERDSA). Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(8), 289\u2013293 (2012)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"issue":"11","key":"1368_CR27","first-page":"3025","volume":"9","author":"H Wang","year":"2014","unstructured":"Wang, H., Sun, Z.: Study on the improvement of ELGamal cryptosystem based on elliptic curve. J. Netw. 9(11), 3025\u20133029 (2014)","journal-title":"J. Netw."},{"key":"1368_CR28","doi-asserted-by":"crossref","unstructured":"Dawahdeh, Z.E., Yaakob, S.N., Sagheer, A.M.: Modified ElGamal elliptic curve cryptosystem using hexadecimal representation. Indian J. Sci. Technol. 8(15) (2015)","DOI":"10.17485\/ijst\/2015\/v8i15\/64749"},{"issue":"2","key":"1368_CR29","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MSP.2006.49","volume":"4","author":"R Gennaro","year":"2006","unstructured":"Gennaro, R.: Randomness in cryptography. IEEE Secur. Priv. 4(2), 64\u201367 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"1368_CR30","doi-asserted-by":"crossref","unstructured":"Yunpeng, Z., Yu, Z., Zhong, W., Sinnott, R.O.: Index-based symmetric DNA encryption algorithm. In: Image and Signal Processing (CISP), pp. 2290\u20132294 (2011)","DOI":"10.1109\/CISP.2011.6100690"},{"key":"1368_CR31","unstructured":"Abbasy, M.R., Nikfard, P., Ordi, A., Torkaman, M.R.N.: DNA base data hiding algorithm. In: IJNCAA, pp. 183\u2013192 (2012)"},{"key":"1368_CR32","doi-asserted-by":"crossref","unstructured":"Gao, Q.: A few DNA based security techniques. In: Systems, Applications and Technology Conference, pp. 1\u20135. IEEE, Long Island (2011)","DOI":"10.1109\/LISAT.2011.5784229"},{"key":"1368_CR33","unstructured":"Dhawan, S., Saini, A.: A new DNA encryption technique for secure data transmission. In: IJETCAS, pp. 36\u201342 (2012)"},{"key":"1368_CR34","doi-asserted-by":"crossref","unstructured":"Mandge, T., Choudhary, V.: A DNA encryption technique based on matrix manipulation and secure key generation. In: ICICES, pp. 47\u201352. IEEE (2013)","DOI":"10.1109\/ICICES.2013.6508181"},{"key":"1368_CR35","doi-asserted-by":"crossref","unstructured":"Majumder, A., Majumdar, A., Podder, T., Kar, N., Sharma, M.: DNA-based cryptographic approach toward information security. In: Advances in Intelligent Systems and Computing, vol. 308, pp. 209\u2013219. Springer (2015)","DOI":"10.1007\/978-81-322-2012-1_22"},{"key":"1368_CR36","doi-asserted-by":"crossref","unstructured":"Aich, A., Sen, A., Dash, S.R., Dehuri, S.: A symmetric key cryptosystem using DNA sequence with OTP key. In: Advances in Intelligent Systems and Computing, pp. 207\u2013215 (2015)","DOI":"10.1007\/978-81-322-2247-7_22"},{"key":"1368_CR37","doi-asserted-by":"crossref","unstructured":"Majumder, A., Majumdar, A., Podder, T., Kar, N., Sharma, M.: Secure data communication and cryptography based on DNA based message encoding. In: ICACCCT. IEEE (2014)","DOI":"10.1109\/ICACCCT.2014.7019464"},{"key":"1368_CR38","doi-asserted-by":"crossref","unstructured":"Cui, G., Han, D., Wang, Y.: An improved method of DNA information encryption. In: BIC-TA, CCIS, pp. 73\u201377. Springer (2014)","DOI":"10.1007\/978-3-662-45049-9_12"},{"key":"1368_CR39","doi-asserted-by":"crossref","unstructured":"Sundaram, G.S., Pavithra, S., Arthi, A., Bala, B.M., Mahalakshmi, S.: Cellular automata based DNA cryptography algorithm. In: ISCO. IEEE (2015)","DOI":"10.1109\/ISCO.2015.7282333"},{"key":"1368_CR40","doi-asserted-by":"crossref","unstructured":"Aich, A., Sen, A., Dash, S.R., Dehuri, S.: Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie hellman key sharing technique. In: CCCIT, pp. 1\u20136 (2015)","DOI":"10.1109\/C3IT.2015.7060130"},{"key":"1368_CR41","unstructured":"Gugnani, G., Ghrera, S.P., Gupta, P.K., Malekian, R., Maharaj, B.T.J.: Implementing DNA . In: Advances in Intelligent Systems and Computing, vol. 381. Springer (2016)"},{"key":"1368_CR42","doi-asserted-by":"crossref","unstructured":"Thangavel, M., Varalakshmi, P., Sindhuja, R.: A Comparative study on DNA cryptosystem. In: IEEE International Conference on Recent Trends in Information Technology (ICRTIT) (2016)","DOI":"10.1109\/ICRTIT.2016.7569578"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1368-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1368-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1368-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T12:36:34Z","timestamp":1570365394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1368-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,22]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["1368"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1368-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,22]]}}}