dc.contributor.author | Fan, X. | |
dc.contributor.author | Gong, G. | |
dc.contributor.author | Longa, P. | |
dc.contributor.author | Schoenmakers, B. | |
dc.contributor.author | Sica, F. | |
dc.contributor.author | Sidorenko, A. | |
dc.date.accessioned | 2015-11-03T07:55:16Z | |
dc.date.available | 2015-11-03T07:55:16Z | |
dc.date.issued | 2013 | |
dc.identifier.uri | http://nur.nu.edu.kz/handle/123456789/690 | |
dc.description.abstract | The study of elliptic curves in the context of cryptography is less than thirty years old. Thanks to work such as ours, this technology is now sufficiently well understood and reliable to be deployed commercially and endorsed by the United States NSA. | ru_RU |
dc.language.iso | en | ru_RU |
dc.publisher | Nazarbayev University | ru_RU |
dc.subject | first research week | ru_RU |
dc.subject | cryptography | ru_RU |
dc.subject | elliptic curve cryptography | ru_RU |
dc.subject | elliptic curves | ru_RU |
dc.title | Fast and secure elliptic curve cryptography | ru_RU |
dc.type | Abstract | ru_RU |