Analysis of the certain cryptographic problems in protocols of certyfing the nodes in IOT infrastructure
Abstract
Beginning with the basic issues of number theory and cryptographic theory, selected factorization algorithms and problems associated with cryptographic algorithms based on elliptic curve isogenies are presented in this paper.
Papers must be accompanied by the following submission letter (form available at journal’s website), signed by all Authors: Declaration
Author, who submits the paper, bears the main responsibility for given data. „Ghostwriting” and „guest authorship” are the symptoms of scientific dishonesty, and all discovered cases will be exposed, including informing suitable entities. Authors are also required to fill in De Gruyter Open Access License. The form should be sent to the Editorial Office via electronic mail to the e-mail address: pjas@pwsip.edu.pl.