ИСТИНА |
Войти в систему Регистрация |
|
Интеллектуальная Система Тематического Исследования НАукометрических данных |
||
In the last two decades elliptic curves have become a sufficient part of numerous cryptographic primitives and protocols. Hence it is extremely important to use the elliptic curves, that do not break security of such protocols. This paper is about the elliptic curves used with GOST R 34.10-2001, GOST R 34.10-2012 and the accompanying algorithms, their security properties and generation process.