Using the fingerprint to the elliptic curve cryptosystems
DOI:
https://doi.org/10.18372/2225-5036.17.3394Keywords:
cryptography, elliptic curves, fingerprint, , approximation, interpolationAbstract
In this paper proposed the use of fingerprints as the primary source for cryptographic systems on elliptic curves, as well as methods for detection of characteristic fragments reflecting fingerprints.References
Алгоритмические основы эллиптической криптографии / А. А. Болотов, С. Б. Гашков, А. Б. Фролов и др. – М.: МЭИ, 2000. – 100 с.
Цифровая обработка изображений в среде MATLAB / Р. Гонсалес, Р. Вудс, С. Эддинс – М.: Техносфера, 2006. – 616 с.
Downloads
Published
2012-06-15
How to Cite
Швець, В. А., & Шестакова, В. В. (2012). Using the fingerprint to the elliptic curve cryptosystems. Ukrainian Scientific Journal of Information Security, 17(1), 64–67. https://doi.org/10.18372/2225-5036.17.3394
Issue
Section
Cryptology