ИСТИНА |
Войти в систему Регистрация |
|
ФНКЦ РР |
||
In the last two decades elliptic curves have become a sufficient part of numerous cryptographic primitives and protocols. Hence it is extremely important to use the elliptic curves, that do not break security of such protocols. This paper is about the elliptic curves used with GOST R 34.10-2001, GOST R 34.10-2012 and the accompanying algorithms, their security properties and generation process.