Published December 14, 2022 | Version v1
Journal article Open

ELLIPTIK EGRI CHIZIQLARNING KRIPTOGRAFIYADA QO'LLANISHI

  • 1. TATU, Kiberxavfsizlik va kriminalistika kafedrasi mudiri, phd.
  • 2. TATU magistranti

Description

Ushbu maqolada Elliptik egri chiziq strukturasi va ularning ahamiyati, kriptografik tizimlarda Elliptik egri chiziqlarning qo'llanilishi tavsiflangan.

Files

22-25.pdf

Files (757.3 kB)

Name Size Download all
md5:b66ccb34144c372a8d86a7b274ea2a3a
757.3 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 10.5281/zenodo.7438335 (DOI)

References

  • 1. C. Lederer, R. Mader, M. Koschuch, J. Großschädl, A. Szekely, andS. Tillich, "Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks," in Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP '09, (Berlin, Heidelberg), pp. 112–127, Springer-Verlag, 2009. 2. Z. Liu, E. Wenger, and J. Großschädl, MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks, pp. 361–379. Cham: Springer International Publishing, 2014. 3. Z. Liu, J. Weng, Z. Hu, and H. Seo, "Efficient Elliptic Curve Cryptography for Embedded Devices," ACM Trans. Embed. Comput. Syst., vol. 16, pp. 53:1–53:18, Dec. 2016. 4. H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, and F. Vercauteren, Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition. Chapman & Hall/CRC, 2nd ed., 2012.