{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:10:00Z","timestamp":1760080200738,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/comapp.2018.8460338","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T21:46:11Z","timestamp":1536875171000},"page":"1-340","source":"Crossref","is-referenced-by-count":9,"title":["Rabin Public-Key Cryptosystem in the Domain of Gaussian Integers"],"prefix":"10.1109","author":[{"given":"Yahia","family":"Awad","sequence":"first","affiliation":[]},{"given":"Abdul Nasser","family":"El-Kassar","sequence":"additional","affiliation":[]},{"given":"Therrar","family":"Kadri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139012843"},{"key":"ref11","first-page":"79","article-title":"A Comparative Study of ElGamal Based Cryptographic Algorithms","author":"haraty","year":"2004","journal-title":"ICEIS"},{"key":"ref12","first-page":"183","article-title":"A Comparative Study of RSA Based Cryptographic Algorithms","author":"haraty","year":"2004","journal-title":"IASSE"},{"journal-title":"Elementary Number Theory and Its Applications","year":"1988","author":"kenneth","key":"ref13"},{"key":"ref14","first-page":"275","article-title":"Elgamal Signature Scheme In The Domain Of Gaussian Integers","author":"kojok","year":"2002","journal-title":"RTST"},{"key":"ref15","article-title":"Security systems based on Gaussian integers: Analysis of basic operations and time complexity of secret transformations","author":"koval","year":"2011","journal-title":"New Jersey Institute of Technology"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"ref16"},{"key":"ref17","article-title":"Digitalized signature as intractable as factorization","author":"rabin","year":"1978","journal-title":"MIN Lab of Computer Science Technical Report MIT\/LCS\/TR-212"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref19","article-title":"The Rabin Cryptosystem & analysis in measure of Chinese Reminder Theorem","author":"srivastava","year":"2013","journal-title":"International Journal of Scientific and Research Publications"},{"key":"ref4","first-page":"405","article-title":"EI-Gamal public key cryptosystem in the domain of Gaussian integers","author":"el-kassar","year":"2001","journal-title":"Int J Appl Math"},{"journal-title":"Generalizations of Lehmer's equations greatest common divisor matrices and Euler's totient for a U F D","year":"1991","author":"el-kassar","key":"ref3"},{"key":"ref6","first-page":"189","article-title":"ElGamal Public-Key Cryptosystem Using Reducible Polynomials Over a Finite Field","author":"el-kassar","year":"2004","journal-title":"Proceedings of the ISCA 13th International Conference on Intelligent and Adaptive Systems and Software Engineering"},{"key":"ref5","first-page":"298","article-title":"Modified RSA in the Domain of Gaussian Integers and Rings of Polynomials Over Finite Fields","author":"el-kassar","year":"2005","journal-title":"Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering Sheraton Moana Surfrider"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref7","article-title":"Rabin Public Key Cryptosystem in Rings of Polynomials over Finite Fields","author":"el-kassar","year":"2004","journal-title":"Proceedings of the Third International Conference on Computer Science Software Engineering Information Technology e-Business and Applications Cairo"},{"key":"ref2","first-page":"518","article-title":"The Euler's ?-function in the Gaussian integers","volume":"90","author":"cross","year":"1983","journal-title":"Amer Math Monthly"},{"article-title":"Applications of Number Theory to Cryptography","year":"2002","author":"awad","key":"ref1"},{"journal-title":"Contemporary Abstract Algebra","year":"1998","author":"gallian","key":"ref9"},{"key":"ref20","article-title":"Arithmetics in the domain of Gaussian integers","author":"yassin","year":"1997","journal-title":"Senior Project Beirut Arab University"}],"event":{"name":"2018 International Conference on Computer and Applications (ICCA)","start":{"date-parts":[[2018,8,25]]},"location":"Beirut","end":{"date-parts":[[2018,8,26]]}},"container-title":["2018 International Conference on Computer and Applications (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8449906\/8460181\/08460338.pdf?arnumber=8460338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:39:59Z","timestamp":1643197199000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8460338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/comapp.2018.8460338","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}