Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
To: Author
Today, public-key cryptosystems are particularly vulnerable to fetching cipher text and adaptively matched plaintext attacks. To prevent such attacks, in practice, optimal asymmetric algorithms are used, for example, RSA-OAEP and etc. In this article, using the method of encoding messages by points of an elliptic curve, an optimal asymmetric algorithm is proposed for data encryption which is based on elliptic curves.
Article content is being processed or not available yet.
kuryazov_d.m.. 2021. \u201cOptimal Asymmetric Data Encryption Algorithm\u201d. Global Journal of Computer Science and Technology - H: Information & Technology GJCST-H Volume 21 (GJCST Volume 21 Issue H2): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 101
Country: Unknown
Subject: Global Journal of Computer Science and Technology - H: Information & Technology
Authors: Kuryazov D.M. (PhD/Dr. count: 0)
View Count (all-time): 256
Total Views (Real + Logic): 3796
Total Downloads (simulated): 985
Publish Date: 2021 04, Mon
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
Today, public-key cryptosystems are particularly vulnerable to fetching cipher text and adaptively matched plaintext attacks. To prevent such attacks, in practice, optimal asymmetric algorithms are used, for example, RSA-OAEP and etc. In this article, using the method of encoding messages by points of an elliptic curve, an optimal asymmetric algorithm is proposed for data encryption which is based on elliptic curves.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.