Login / Signup

Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012.

Stanislav SmyshlyaevEvgeny K. AlekseevIgor B. OshkinVladimir PopovSerguei LeontievVladimir PodobaevDmitry Belyavsky
Published in: RFC (2016)
Keyphrases
  • cryptographic algorithms
  • data encryption standard
  • security protocols
  • biometric data
  • elliptic curve cryptography
  • security systems
  • information systems
  • elliptic curve