Article Fingerprint
ReserarchID
CSTITRTPL0
Today, public-key cryptosystems are particularly vulnerable to fetching cipher text and adaptively matched plaintext attacks. To prevent such attacks, in practice, optimal asymmetric algorithms are used, for example, RSA-OAEP and etc. In this article, using the method of encoding messages by points of an elliptic curve, an optimal asymmetric algorithm is proposed for data encryption which is based on elliptic curves.
kuryazov_d.m.. 2021. \u201cOptimal Asymmetric Data Encryption Algorithm\u201d. Global Journal of Computer Science and Technology - H: Information & Technology GJCST-H Volume 21 (GJCST Volume 21 Issue H2).
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 101
Country: Unknown
Subject: Global Journal of Computer Science and Technology - H: Information & Technology
Authors: Kuryazov D.M. (PhD/Dr. count: 0)
View Count (all-time): 327
Total Views (Real + Logic): 3932
Total Downloads (simulated): 1010
Publish Date: 2021 04, Mon
Monthly Totals (Real + Logic):
This study aims to comprehensively analyse the complex interplay between
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.