UA38388U - Method for key hashing theoretically proved stability with use of transformations is group of points of elliptical curve - Google Patents

Method for key hashing theoretically proved stability with use of transformations is group of points of elliptical curve

Info

Publication number
UA38388U
UA38388U UAU200810953U UAU200810953U UA38388U UA 38388 U UA38388 U UA 38388U UA U200810953 U UAU200810953 U UA U200810953U UA U200810953 U UAU200810953 U UA U200810953U UA 38388 U UA38388 U UA 38388U
Authority
UA
Ukraine
Prior art keywords
transformations
points
group
elliptical curve
theoretically proved
Prior art date
Application number
UAU200810953U
Other languages
Russian (ru)
Ukrainian (uk)
Inventor
Александр Александрович Кузнецов
Сергей Петрович Евсеев
Владислав Евгеньевич Чевардин
Ирина Александровна Золотарева
Виталий Вячеславович Огурцов
Original Assignee
Сергей Петрович Евсеев
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Сергей Петрович Евсеев filed Critical Сергей Петрович Евсеев
Priority to UAU200810953U priority Critical patent/UA38388U/en
Publication of UA38388U publication Critical patent/UA38388U/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

Method for key hashing theoretically proved stability with use of transformations is group of points of elliptical curve relates to cryptographic protection of information and can be used at development of mechanisms for provision of integrity and authenticity of data.
UAU200810953U 2008-09-08 2008-09-08 Method for key hashing theoretically proved stability with use of transformations is group of points of elliptical curve UA38388U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
UAU200810953U UA38388U (en) 2008-09-08 2008-09-08 Method for key hashing theoretically proved stability with use of transformations is group of points of elliptical curve

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
UAU200810953U UA38388U (en) 2008-09-08 2008-09-08 Method for key hashing theoretically proved stability with use of transformations is group of points of elliptical curve

Publications (1)

Publication Number Publication Date
UA38388U true UA38388U (en) 2009-01-12

Family

ID=50558313

Family Applications (1)

Application Number Title Priority Date Filing Date
UAU200810953U UA38388U (en) 2008-09-08 2008-09-08 Method for key hashing theoretically proved stability with use of transformations is group of points of elliptical curve

Country Status (1)

Country Link
UA (1) UA38388U (en)

Similar Documents

Publication Publication Date Title
EP2638659A4 (en) Method and apparatus to use identify information for digital signing and encrypting content integrity and authenticity in content oriented networks
TW200729882A (en) Method and apparatus for generating a license
NZ603822A (en) Permutation data transform to enhance security
EP2013718A4 (en) Method, system, and computer-readable medium to provide version management of documents in a file management system
WO2011162990A3 (en) Single-use authentication methods for accessing encrypted data
GB2484207A (en) Method and apparatus for medical information encryption
MX2014000280A (en) Methods and apparatus to measure exposure to streaming media.
GB201307398D0 (en) Systems and methods of caching security information
GB201302922D0 (en) Managing encryption keys in a computer system
EA201690882A1 (en) CRYPTOGRAPHIC MARK WATER SIGN CONTENTS IN FUEL EFFICIENCY EQUIPMENT
TW200745904A (en) Method and apparatus for binding computer memeory to motherboard
EP2511848A3 (en) Multiple independent encryption domains
TW200943124A (en) Personal license server and methods for use thereof
SG155807A1 (en) Method and system of embedding optical security features using virtual printer
MX2012000294A (en) Method and apparatus for providing contents via network, method and apparatus for receiving contents via network, and method and apparatus for backing up data via network, backup data providing device, and backup system.
WO2008105941A3 (en) Apparatus and method for cryptographic protection of directories and files
GB201215647D0 (en) Secure data scanning method and system
GB201307396D0 (en) Systems and methods for storing and verifying security information
UA38388U (en) Method for key hashing theoretically proved stability with use of transformations is group of points of elliptical curve
SG148989A1 (en) Portable electronic device and file management method for use in portable electronic device
GB2498122A (en) Modifying a length of an element to form an encryption key
WO2011144086A3 (en) Advertisement insertion method, device and system
GB2457558B (en) Copy limitation management device and method, and content storage device
UA37465U (en) Method for key hashing of theoretically proved stability
João The importance of data and scale issues for Strategic Environmental Assessment (SEA)