Published December 14, 2022
| Version v1
Journal article
Open
ELLIPTIK EGRI CHIZIQLARNING KRIPTOGRAFIYADA QO'LLANISHI
- 1. TATU, Kiberxavfsizlik va kriminalistika kafedrasi mudiri, phd.
- 2. TATU magistranti
Description
Ushbu maqolada Elliptik egri chiziq strukturasi va ularning ahamiyati, kriptografik tizimlarda Elliptik egri chiziqlarning qo'llanilishi tavsiflangan.
Files
22-25.pdf
Files
(757.3 kB)
Name | Size | Download all |
---|---|---|
md5:b66ccb34144c372a8d86a7b274ea2a3a
|
757.3 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 10.5281/zenodo.7438335 (DOI)
References
- 1. C. Lederer, R. Mader, M. Koschuch, J. Großschädl, A. Szekely, andS. Tillich, "Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks," in Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP '09, (Berlin, Heidelberg), pp. 112–127, Springer-Verlag, 2009. 2. Z. Liu, E. Wenger, and J. Großschädl, MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks, pp. 361–379. Cham: Springer International Publishing, 2014. 3. Z. Liu, J. Weng, Z. Hu, and H. Seo, "Efficient Elliptic Curve Cryptography for Embedded Devices," ACM Trans. Embed. Comput. Syst., vol. 16, pp. 53:1–53:18, Dec. 2016. 4. H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, and F. Vercauteren, Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition. Chapman & Hall/CRC, 2nd ed., 2012.