z-logo
open-access-imgOpen Access
Methods of cryptographically steady elliptic curves generation
Author(s) -
Larissa V. Cherckesova,
Olga Safaryan,
Pavel Razumov,
Boris A. Akishin,
Vladislav Chumakov,
Ivan V. Smirnov,
Irina Trubchik
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/1001/1/012067
Subject(s) - elliptic curve , elliptic curve cryptography , supersingular elliptic curve , mathematics , computer science , pure mathematics , public key cryptography , encryption , computer security
This article is devoted to a complex study of elliptic curves and description and characteristics of it are presented. Moreover, algorithms for generating cryptographically stable elliptic properties that ensure the greatest curves are revealed. The detailed description is given, and the resistance of the elliptic curves to the different types of cryptographic attacks are determined, grounding on the comparative analysis of information security system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here