The article is devoted to the study of elliptic curves in cryptography. Particular attention is paid to their advantages over other public-key cryptographic systems, as well as a platform is proposed for the hardware implementation of the elliptic curve in cryptography.Статья посвящена исследованию эллиптических кривых в криптографии. Особое внимание уделено в их преимуществе над другими криптографическими системами с открытым ключом, а также предложена платформа для аппаратной реализации эллиптической кривой в криптографии
This article lists some results of a probabilistic analysis of the durability of information protect...
The method is considered for realization of public-key cryptographic transformations based on the us...
The modular secret sharing scheme with consecutive moduli is constructed. The homomorphic property o...
The article is devoted to the study of elliptic curves in cryptography. Particular attention is paid...
Theoretical-code charts built with the use of elliptic kodas are examined. Сharts which allow effect...
The problem of protecting information for both an ordinary user and the entire Internet is regarded ...
Робота присвячена огляду та аналізу алгоритмів формування електронного цифрового підпису. Порівнюють...
Рассмотрен один из возможных подходов в представлении точек эллиптической кривой над двоичными полям...
The article is devoted to the study of the modern phenomenon of the world monetary system - cryptocu...
The article is devoted to the protection of market manipulation and the misuse of insider informatio...
Робота присвячена підвищенню швидкості постановки та верифікації електронного цифрового підпису на е...
The article is devoted to the functioning of blockchain technology in the field of intellectual prop...
The article is devoted to the analysis of the possibilities and boundaries of using digital document...
The article contains information about the current state and prospects of use of information technol...
[[abstract]] 近年來,有許多的非交互可否認認證協定被發表。這些協定可區分為兩種:以簽章為基礎的協定與以共享秘密為基礎的協定。回顧這些方案後,我們發現以簽章為基礎的方法無法否認訊息的來源,...
This article lists some results of a probabilistic analysis of the durability of information protect...
The method is considered for realization of public-key cryptographic transformations based on the us...
The modular secret sharing scheme with consecutive moduli is constructed. The homomorphic property o...
The article is devoted to the study of elliptic curves in cryptography. Particular attention is paid...
Theoretical-code charts built with the use of elliptic kodas are examined. Сharts which allow effect...
The problem of protecting information for both an ordinary user and the entire Internet is regarded ...
Робота присвячена огляду та аналізу алгоритмів формування електронного цифрового підпису. Порівнюють...
Рассмотрен один из возможных подходов в представлении точек эллиптической кривой над двоичными полям...
The article is devoted to the study of the modern phenomenon of the world monetary system - cryptocu...
The article is devoted to the protection of market manipulation and the misuse of insider informatio...
Робота присвячена підвищенню швидкості постановки та верифікації електронного цифрового підпису на е...
The article is devoted to the functioning of blockchain technology in the field of intellectual prop...
The article is devoted to the analysis of the possibilities and boundaries of using digital document...
The article contains information about the current state and prospects of use of information technol...
[[abstract]] 近年來,有許多的非交互可否認認證協定被發表。這些協定可區分為兩種:以簽章為基礎的協定與以共享秘密為基礎的協定。回顧這些方案後,我們發現以簽章為基礎的方法無法否認訊息的來源,...
This article lists some results of a probabilistic analysis of the durability of information protect...
The method is considered for realization of public-key cryptographic transformations based on the us...
The modular secret sharing scheme with consecutive moduli is constructed. The homomorphic property o...