Downloads: 52
Research Paper | Information Security | Uzbekistan | Volume 10 Issue 1, January 2021
Optimal Asymmetric Data Encryption Algorithm
Kuryazov D.M.
Abstract: Today, public-key cryptosystems are particularly vulnerable to fetching ciphertext and adaptively matched plaintext attacks. To prevent such attacks, in practice, optimal asymmetric algorithms are used, for example, RSA-OAEP and etc. In this article, using the method of encoding messages by points of an elliptic curve, an optimal asymmetric algorithm is proposed for data encryption which is based on elliptic curves.
Keywords: asymmetric algorithms, elliptical curves, encoding, decoding
Edition: Volume 10 Issue 1, January 2021,
Pages: 744 - 748
Similar Articles with Keyword 'algorithms'
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, United States of America, Volume 13 Issue 7, July 2024
Pages: 371 - 376Utilizing Artificial Intelligence for Patient Risk Predictions: Empowering Doctors with Data - Driven Insights
Downloads: 2
Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 11, November 2021
Pages: 410 - 415Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities
Mohammed Alwakeel | Sultan Swailem Alatawi