{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:34Z","timestamp":1738777234576,"version":"3.37.0"},"reference-count":22,"publisher":"Academy Publisher","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.11.3025-3029","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T01:56:03Z","timestamp":1414979763000},"source":"Crossref","is-referenced-by-count":1,"title":["Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve"],"prefix":"10.4304","volume":"9","author":[{"given":"Huqing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhixin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[1969,12,31]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref2","first-page":"109","article-title":"Multiuser cryptographic techniques.","volume-title":"Federal Informaion Processing Standard Conference Proceedings","volume":"45","author":"Diffie","year":"1976","unstructured":"[2] W. Diffie, M. E. Hellman. Multiuser cryptographic techniques. Federal Informaion Processing Standard Conference Proceedings, vol. 45, pp. 109-112, 1976."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"issue":"No. 3","key":"ref4","first-page":"51","article-title":"Analysis and improvement of a password-based authenticated key exchange protocol.","volume":"31","author":"Jian","year":"2010","unstructured":"[5] Shu Jian, Xu Chun-xiang. Analysis and improvement of a password-based authenticated key exchange protocol. Journal on Communications, Vol. 31, No. 3, 2010: 51-56.","journal-title":"J Commun","ISSN":"https:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"issue":"No, 10","key":"ref5","first-page":"26","article-title":"Pre-distribution asymmetric key management scheme for mobile ad hoc networks.","volume":"33","author":"Lei","year":"2012","unstructured":"[6] Han Lei, Liu Ji-qiang, Han Zhen, Wei Xue-ye. Pre-distribution asymmetric key management scheme for mobile ad hoc networks. Journal on Communications, Vol. 33, No, 10, 2012: 26-34.","journal-title":"J Commun","ISSN":"https:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"issue":"No, 8","key":"ref6","first-page":"80","article-title":"Verifiable secret sharing scheme based on ELGamal cryptosystem.","volume":"37","author":"Yi","year":"2010","unstructured":"[7] Liu Yi, Hao Yan-jun, Pang Liao-jun. Verifiable secret sharing scheme based on ELGamal cryptosystem. Computer Science, Vol. 37, No, 8, 2010: 80-82.","journal-title":"Computer Science"},{"issue":"No. 16","key":"ref7","first-page":"135","article-title":"Zhang Jian-zhong. Threshold secret sharing scheme based on ELGamal cryptosystem.","volume":"36","year":"2010","unstructured":"[8] Wang Tian-cheng, Zhang Jian-zhong. Threshold secret sharing scheme based on ELGamal cryptosystem. Computer Engineering, Vol. 36, No. 16, 2010: 135-136.","journal-title":"Computer Engineering"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"issue":"No. 5","key":"ref9","first-page":"38","article-title":"An elliptic curve based key predistribution approach for wireless multimedia sensor networks.","volume":"32","author":"Ru-chuan","year":"2012","unstructured":"[10] Wang Ru-chuan, Lin Qiao-min, Ye Ning. An elliptic curve based key predistribution approach for wireless multimedia sensor networks. Journal of Nanjing University of Posts and Telecommunicaions(Natural Science), Vol. 32, No. 5, 2012: 38-44.","journal-title":"Journal of Nanjing University of Posts and Telecommunicaions"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"ref11","first-page":"71","volume-title":"Welsh M Smith M D A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography","author":"Malan","year":"2004","unstructured":"[12] Malan, D. J. Welsh, M. Smith, M. D. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. Sensor and AdHoc Communications and Networks, 2004: 71-80."},{"issue":"No. 12","key":"ref12","first-page":"53","article-title":"Du Chun-lai, Hu Ming-zeng, Zhang Hong-li. New group key management framework for mobil ad hoc network based on identity authentication in elliptic curve field.","volume":"128","year":"2007","unstructured":"[13] Du Chun-lai, Hu Ming-zeng, Zhang Hong-li. New group key management framework for mobil ad hoc network based on identity authentication in elliptic curve field. Journal on Communications, Vol. 128, No. 12, 2007: 53-59.","journal-title":"J Commun","ISSN":"https:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"issue":"No. 3","key":"ref13","first-page":"469","article-title":"ElGamal cryptsystem with authentication based on ECDLP.","volume":"31","author":"Xu","year":"2010","unstructured":"[14] Yao Xu, Zhou Wei. ElGamal cryptsystem with authentication based on ECDLP. Computer Engineering and Design. Vol. 31, No. 3. 2010: 469-471.","journal-title":"Computer Engineering and Design"},{"issue":"No. 3","key":"ref14","first-page":"44","article-title":"ELGama digital signature scheme based on the elliptic curves.","volume":"25","year":"2010","unstructured":"[15] Wu Hong-mei. ELGama digital signature scheme based on the elliptic curves. Journal of ChuXiong Normal University. Vol. 25, No. 3. 2010: 44-47.","journal-title":"Journal of ChuXiong Normal University"},{"issue":"No. 3","key":"ref15","first-page":"139","article-title":"A new ecc elgamal proxy encryption-based group key distribution scheme for MANET.","volume":"30","author":"Zijin","year":"2013","unstructured":"[17] Xiao Zijin, Zhou Hai, Wu Lizhen. A new ecc elgamal proxy encryption-based group key distribution scheme for MANET. Computer Applications and Software. Vol. 30, No. 3. 2013, 139-144.","journal-title":"Computer Applications and Software"},{"key":"ref16","first-page":"18","article-title":"On the CCA1-Security of Elgamal and Damgard's Elgamal. Inscrypt 2010","volume":"6584","author":"Lipmaa","year":"2011","unstructured":"[19] Helger Lipmaa. On the CCA1-Security of Elgamal and Damgard's Elgamal. Inscrypt 2010, LNCS 6584, pp: 18-35, 2011.","journal-title":"LNCS"},{"key":"ref17","first-page":"68","article-title":"A Robust and Plaintext-Aware Variant. RSA 2013","volume":"7779","author":"Seurin","year":"2013","unstructured":"[20] Y. Seurin, J. Treger. A Robust and Plaintext-Aware Variant. RSA 2013, LNCS 7779, pp: 68-83, 2013.","journal-title":"LNCS"},{"volume-title":"Attack on ELGamal cryptosystem","year":"2012","key":"ref18","unstructured":"[21] Feng Xiao-bo. Attack on ELGamal cryptosystem. ShanDong University, 2012."},{"key":"ref19","first-page":"30","article-title":"Why textbook ELGamal and RSA encryption are insecure","volume-title":"Proceedings of Asiacypt 2000 LNCS","volume":"1976","author":"Boneh","year":"2000","unstructured":"[22] D. Boneh, A. Joux, P. Nguyen. Why textbook ELGamal and RSA encryption are insecure, in Proceedings of Asiacypt 2000, LNCS, vol. 1976(Springer, Berlin, 2000), pp. 30-43."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9047-0"},{"issue":"No. Z1","key":"ref21","first-page":"228","article-title":"Algorithm of NAF scalar multiplication on ECC against SPA.","volume":"33","author":"Min","year":"2012","unstructured":"[24] Wang Min, Wu Zhen. Algorithm of NAF scalar multiplication on ECC against SPA. Journal on Communicaions, Vol. 33, No. Z1, 2012: 228-232.","journal-title":"Journal on Communicaions"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.01.002"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:35Z","timestamp":1738775315000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1969,12,31]]},"references-count":22,"journal-issue":{"issue":"11","published-online":{"date-parts":[[1969,12,31]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.11.3025-3029","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[1969,12,31]]}}}