Analysis of the certain cryptographic problems in protocols of certyfing the nodes in IOT infrastructure
Abstract
Beginning with the basic issues of number theory and cryptographic theory, selected factorization algorithms and problems associated with cryptographic algorithms based on elliptic curve isogenies are presented in this paper.
The copyright statement must be confirmed with Open Journal Systems.
Author, who submits the paper, bears the main responsibility for given data. „Ghostwriting” and „guest authorship” are the symptoms of scientific dishonesty, and all discovered cases will be exposed, including informing suitable entities. Authors are also required to read the terms of the De Gruyter Open Access License for Open Journal Systems.