2015
DOI: 10.28925/1609-8595.2015.4.6469
|View full text |Cite
|
Sign up to set email alerts
|

Practice-Oriented Learning of Bachelors of Advertising and Public Relations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…In cryptosystems based on Elliptic Curves (EC), it is proposed to use crypto-transformations based on transformations and multiplication of points of elliptic curves over Galois fields GF(p), GF(2 m ), GF(p m ), where p and m are primes [11], [12]. The main advantages of elliptic cryptography are: a much shorter key length compared to "classical" asymmetric cryptography (example RSA) and fast software and hardware implementation (Table 2).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In cryptosystems based on Elliptic Curves (EC), it is proposed to use crypto-transformations based on transformations and multiplication of points of elliptic curves over Galois fields GF(p), GF(2 m ), GF(p m ), where p and m are primes [11], [12]. The main advantages of elliptic cryptography are: a much shorter key length compared to "classical" asymmetric cryptography (example RSA) and fast software and hardware implementation (Table 2).…”
Section: Methodsmentioning
confidence: 99%
“…Let us define an addition operation for points from the elements of the field GF(2 m ). Let the coordinates of the two point's Р = (х 1 , у 1 ) and Q = (х 2 , у 2 ), be known, then the sum of Р + Q = (х 3 , у 3 ) is determined as follows [11,12]:…”
Section: Table 1 -Cryptographic Protocols Zkpmentioning
confidence: 99%