gptkbp:instance_of
|
gptkb:Wrestling
|
gptkbp:based_on
|
Discrete logarithm problem
|
gptkbp:developed_by
|
data integrity
|
https://www.w3.org/2000/01/rdf-schema#label
|
El Gamal signature scheme
|
gptkbp:includes
|
signature verification
signature generation
|
gptkbp:invention
|
gptkb:Taher_Elgamal
|
gptkbp:is_adopted_by
|
secure transactions
various organizations
|
gptkbp:is_analyzed_in
|
security risks
|
gptkbp:is_based_on
|
mathematical principles
|
gptkbp:is_compared_to
|
ECDSA
|
gptkbp:is_compatible_with
|
gptkb:RSA
|
gptkbp:is_considered
|
security audits
|
gptkbp:is_considered_as
|
secure method
|
gptkbp:is_defined_by
|
gptkb:ISO/_IEC_9796-2
|
gptkbp:is_described_as
|
academic literature
|
gptkbp:is_discussed_in
|
cryptography forums
|
gptkbp:is_evaluated_by
|
gptkb:crypt
gptkb:performance
other signature schemes
|
gptkbp:is_explored_in
|
research papers
thesis works
|
gptkbp:is_implemented_in
|
gptkb:Open_SSL
cryptographic protocols
cryptographic systems
|
gptkbp:is_part_of
|
gptkb:crypt
security protocols
encryption techniques
information security
digital signature standards
|
gptkbp:is_recognized_by
|
security experts
|
gptkbp:is_related_to
|
gptkb:crypt
|
gptkbp:is_similar_to
|
DSA
|
gptkbp:is_supported_by
|
academic institutions
cryptographic libraries
|
gptkbp:is_used_by
|
blockchain technologies
|
gptkbp:is_used_for
|
identity verification
|
gptkbp:is_used_in
|
gptkb:software
secure communications
digital currencies
|
gptkbp:is_utilized_for
|
digital signatures
|
gptkbp:is_utilized_in
|
secure email
|
gptkbp:is_vulnerable_to
|
chosen message attacks
|
gptkbp:provides
|
authentication
non-repudiation
|
gptkbp:requires
|
key generation
|
gptkbp:suitable_for
|
real-time applications
|
gptkbp:uses
|
asymmetric cryptography
|
gptkbp:bfsParent
|
gptkb:Wrestling
|
gptkbp:bfsLayer
|
4
|