Elliptic divisibility sequences over the Edwards model of elliptic curves

Author(s):  
Anne Hanwa ◽  
Emmanuel Fouotsa
Author(s):  
Henry McKean ◽  
Victor Moll
Keyword(s):  

2020 ◽  
Vol 24 (1) ◽  
Author(s):  
Nfn Darmanto ◽  
Nur Zaini

AbstrakPenelitian ini dilatarbelakangi oleh menguatnya wacana mengenai pentingnya perlindungan data pribadi  dan terbitnya Peraturan Menteri Komunikasi dan Informatika Nomor 20 Tahun 2016 tentang Perlindungan Data Pribadi dalam Sistem Elektronik. Adapun tujuan penelitian adalah untuk mengetahui kinerja implementasi Peraturan Menteri tersebut di lingkungan Pemerintah Kabupaten. Penelitian  dilakukan di Dinas Kependudukan dan Pencatatan Sipil pada Pemerintah Kabupaten Gianyar, Temanggung, dan Sleman dengan menggunakan metode studi kasus, sedangkan pengum­pu­lan data menggunakan teknik studi pustaka, wawancara, dan observasi. Pembahasan dilakukan dengan menggunakan konsep implemen­tasi model Edwards yang melihat implementasi berdasarkan variabel komunikasi, sumber-sumber, kecenderungan-kecenderu­ngan, dan struk­tur birokrasi. Hasil penelitian menunjuk­kan bahwa penyelenggaraan administrasi kependudukan yang di dalamnya termasuk perlindungan data pribadi oleh Dinas Kependudukan dan Pencatatan Sipil merujuk pada Peraturan Menteri Dalam Negeri Nomor 61 Tahun 2015, sedangkan Peraturan Menteri Komunikasi dan Informatika Nomor 20 tahun 2016 sama sekali belum mereka ketahui. AbstractThis research is motivated by the strengthening of discourse regarding the importance of protecting personal data and the issuance of Minister of Communication and Information Regulation No. 20 of 2016 concerning Protection of Personal Data in Electronic Systems. The research objective is to determine the performance of the implementation of the Ministerial Regulation within the District Government. The study was conducted at the Department of Population and Civil Registration at the Government of the Regency of Gianyar, Temanggung, and Sleman by using a case study method, while data collection using literature study techniques, interviews, and observations. The discussion was carried out using the concept of implementation of Edwards model that looked at implementation based on communication variables, sources, trends, and bureaucratic structure. The results showed that the administration of population administration which included the protection of personal data by the Population and Civil Registry Office referred to the Minister of Home Affairs Regulation No. 61 of 2015, while the Minister of Communication and Information Regulation No. 20 of 2016 was completely unknown to them.   


2004 ◽  
Vol 9 (4) ◽  
pp. 331-348
Author(s):  
V. Garbaliauskienė

A joint universality theorem in the Voronin sense for L-functions of elliptic curves over the field of rational numbers is proved.


Author(s):  
Anna ILYENKO ◽  
Sergii ILYENKO ◽  
Yana MASUR

In this article, the main problems underlying the current asymmetric crypto algorithms for the formation and verification of electronic-digital signature are considered: problems of factorization of large integers and problems of discrete logarithm. It is noted that for the second problem, it is possible to use algebraic groups of points other than finite fields. The group of points of the elliptical curve, which satisfies all set requirements, looked attractive on this side. Aspects of the application of elliptic curves in cryptography and the possibilities offered by these algebraic groups in terms of computational efficiency and crypto-stability of algorithms were also considered. Information systems using elliptic curves, the keys have a shorter length than the algorithms above the finite fields. Theoretical directions of improvement of procedure of formation and verification of electronic-digital signature with the possibility of ensuring the integrity and confidentiality of information were considered. The proposed method is based on the Schnorr signature algorithm, which allows data to be recovered directly from the signature itself, similarly to RSA-like signature systems, and the amount of recoverable information is variable depending on the information message. As a result, the length of the signature itself, which is equal to the sum of the length of the end field over which the elliptic curve is determined, and the artificial excess redundancy provided to the hidden message was achieved.


2013 ◽  
Vol 33 (7) ◽  
pp. 1870-1874
Author(s):  
Zhongxi LAI ◽  
Zhanjun ZHANG ◽  
Dongya TAO
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document