Isogeny-Based Cryptographic Access Control
— Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the discrete logarithm and integer factorization problems, whi...
Uloženo v:
| Vydáno v: | Automatic control and computer sciences Ročník 54; číslo 8; s. 803 - 812 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Moscow
Pleiades Publishing
01.12.2020
|
| Témata: | |
| ISSN: | 0146-4116, 1558-108X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | —
Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the discrete logarithm and integer factorization problems, which are the basis of most modern public-key cryptosystems. In this regard, there is a need to search for new problems that are resistant to attacks on both classical computers and quantum computers. Computing the isogenies of supersingular elliptic curves is one of the most challenging problems. A scheme for cryptographic access control based on isogenies is proposed. Security analysis of the protocol and the results of practical implementation in the SAGE computer algebra system are given. |
|---|---|
| AbstractList | —
Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the discrete logarithm and integer factorization problems, which are the basis of most modern public-key cryptosystems. In this regard, there is a need to search for new problems that are resistant to attacks on both classical computers and quantum computers. Computing the isogenies of supersingular elliptic curves is one of the most challenging problems. A scheme for cryptographic access control based on isogenies is proposed. Security analysis of the protocol and the results of practical implementation in the SAGE computer algebra system are given. |
| Author | Yarmak, A. V. Shtyrkina, A. A. Aleksandrova, E. B. |
| Author_xml | – sequence: 1 givenname: E. B. surname: Aleksandrova fullname: Aleksandrova, E. B. email: helen@ibks.spbstu.ru organization: Peter the Great St. Petersburg Polytechnic University – sequence: 2 givenname: A. A. surname: Shtyrkina fullname: Shtyrkina, A. A. email: anna_sh@ibks.spbstu.ru organization: Peter the Great St. Petersburg Polytechnic University – sequence: 3 givenname: A. V. surname: Yarmak fullname: Yarmak, A. V. email: yarmak.av@ibks.spbstu.ru organization: Peter the Great St. Petersburg Polytechnic University |
| BookMark | eNp9jz1PwzAQhi1UJNLCD2DLjBS4sx3HHUvER6VKDIDEFjmOHVIFO7LD0H9PojKB1OmG95737lmShfPOEHKNcMsQ2N0rIBccUVAACUCLM5JgnssMQX4sSDLH2ZxfkGWMe4ApkyIhN9voW-MO2b2KpknLcBhG3wY1fHY63WhtYkxL78bg-0tyblUfzdXvXJH3x4e38jnbvTxty80u01TKMUNjFTQNVVaIupB6OpSvrWgaBK4l42uRC2tzS5WuuVWU1bkxinFklFkUkq1IcezVwccYjK10N6qxm79QXV8hVLNy9U95IvEPOYTuS4XDSYYemTjtutaEau-_g5sET0A_d3xoPw |
| CitedBy_id | crossref_primary_10_1155_2021_9994200 |
| Cites_doi | 10.1007/978-3-642-14706-7_27 10.1515/jmc-2012-0016 10.3103/S0146411618080333 10.3103/S0146411617080260 10.1007/978-0-387-09494-6 10.1109/TIFS.2013.2287858 10.1504/IJSN.2006.011772 10.3103/S0146411616080101 10.1007/s00145-004-0328-3 10.3103/S014641161508026X 10.3103/S0146411616080095 10.1109/JCN.2009.6388413 10.3103/S0146411615080088 10.1109/SP.2007.11 10.1145/3203217.3206427 10.1109/ICPHYS.2019.8780193 10.1007/978-3-319-11659-4_10 10.1145/237814.237866 10.1109/BlackSeaCom.2019.8812818 10.1007/978-3-642-25405-5_2 10.1109/ICTC.2016.7763528 10.1109/SP.2015.40 10.1109/RED.2016.7779334 10.1007/978-3-642-19571-6_16 10.1109/BlackSeaCom.2018.8433628 10.1145/1180405.1180418 |
| ContentType | Journal Article |
| Copyright | Allerton Press, Inc. 2020. ISSN 0146-4116, Automatic Control and Computer Sciences, 2020, Vol. 54, No. 8, pp. 803–812. © Allerton Press, Inc., 2020. Russian Text © The Author(s), 2020, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy. |
| Copyright_xml | – notice: Allerton Press, Inc. 2020. ISSN 0146-4116, Automatic Control and Computer Sciences, 2020, Vol. 54, No. 8, pp. 803–812. © Allerton Press, Inc., 2020. Russian Text © The Author(s), 2020, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy. |
| DBID | AAYXX CITATION |
| DOI | 10.3103/S0146411620080027 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1558-108X |
| EndPage | 812 |
| ExternalDocumentID | 10_3103_S0146411620080027 |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C -~X .86 .VR 06D 0R~ 0VY 1N0 23N 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 408 40D 40E 5GY 5VS 6NX 8TC 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACCUX ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADRFC ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AETLH AEVLU AEXYK AFBBN AFFNX AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AI. AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ AXYYD B-. BA0 BDATZ BGNMA CAG COF CS3 DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 H13 HF~ HG6 HLICF HMJXF HRMNR HZ~ IJ- IKXTQ IWAJR I~X I~Z J-C JBSCW JZLTJ KOV LLZTM M4Y MA- NPVJJ NQJWS NU0 O9- O93 O9J P9O PF0 PT4 QOS R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TN5 TSG TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW VH1 W48 WK8 XU3 YLTOR Z7R Z83 Z88 ZMTXR ~A9 AAPKM AAYXX ABDBE ABFSG ABJCF ABRTQ ACSTC AEZWR AFDZB AFFHD AFHIU AFKRA AFOHR AHPBZ AHWEU AIXLP ARAPS ATHPR BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS |
| ID | FETCH-LOGICAL-c288t-1efa0dd2af66b78c55859f6dd104c8349656ff5f2acb4fa23b5eea341323f1683 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000619435600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0146-4116 |
| IngestDate | Sat Nov 29 05:52:10 EST 2025 Tue Nov 18 22:19:38 EST 2025 Fri Feb 21 02:49:16 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 8 |
| Keywords | postquantum cryptography cryptography cryptographic access control isogenies of elliptic curves elliptic curves |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c288t-1efa0dd2af66b78c55859f6dd104c8349656ff5f2acb4fa23b5eea341323f1683 |
| PageCount | 10 |
| ParticipantIDs | crossref_citationtrail_10_3103_S0146411620080027 crossref_primary_10_3103_S0146411620080027 springer_journals_10_3103_S0146411620080027 |
| PublicationCentury | 2000 |
| PublicationDate | 20201200 2020-12-00 |
| PublicationDateYYYYMMDD | 2020-12-01 |
| PublicationDate_xml | – month: 12 year: 2020 text: 20201200 |
| PublicationDecade | 2020 |
| PublicationPlace | Moscow |
| PublicationPlace_xml | – name: Moscow |
| PublicationTitle | Automatic control and computer sciences |
| PublicationTitleAbbrev | Aut. Control Comp. Sci |
| PublicationYear | 2020 |
| Publisher | Pleiades Publishing |
| Publisher_xml | – name: Pleiades Publishing |
| References | Le (CR41) 2009; 11 Childs, Jao, Soukharev (CR31) 2014; 8 CR19 CR18 CR17 CR39 CR16 Kalinin, Pavlenko (CR4) 2015; 49 Konoplev, Kalinin (CR10) 2016; 50 CR37 CR14 CR36 CR13 Teske (CR29) 2006; 19 CR35 CR12 CR34 Lavrova, Zaitceva, Zegzhda (CR1) 2019; 2603 CR33 CR32 CR30 Konoplev, Kalinin (CR15) 2015; 49 McEliece (CR22) 1978; 42–44 Zegzhda, Pavlenko (CR5) 2017; 51 Konoplev, Kalinin (CR11) 2016; 50 CR6 CR8 CR7 Zegzhda, Zegzhda, Kalinin (CR3) 2010; 6258 CR9 CR27 CR26 CR25 CR24 Aleksandrova, Shtyrkina, Iarmak (CR42) 2019; 22 CR23 CR21 CR43 CR20 Wang, Sheng, Li (CR40) 2006; 1 Silverman (CR28) 2009 Zhu (CR38) 2013; 8 Zegzhda, Pavlenko (CR2) 2018; 52 M.O. Kalinin (7296_CR4) 2015; 49 7296_CR30 7296_CR32 Y. Zhu (7296_CR38) 2013; 8 7296_CR12 7296_CR34 7296_CR33 7296_CR14 7296_CR36 7296_CR13 7296_CR35 A.S. Konoplev (7296_CR11) 2016; 50 7296_CR16 7296_CR37 E.B. Aleksandrova (7296_CR42) 2019; 22 7296_CR18 J.H. Silverman (7296_CR28) 2009 7296_CR17 7296_CR39 7296_CR19 A.S. Konoplev (7296_CR15) 2015; 49 D.P. Zegzhda (7296_CR5) 2017; 51 X.H. Le (7296_CR41) 2009; 11 E. Teske (7296_CR29) 2006; 19 A. Childs (7296_CR31) 2014; 8 D. Lavrova (7296_CR1) 2019; 2603 7296_CR7 7296_CR6 7296_CR9 7296_CR8 7296_CR21 7296_CR43 7296_CR20 7296_CR23 7296_CR25 7296_CR24 7296_CR27 D.P. Zegzhda (7296_CR3) 2010; 6258 7296_CR26 A.S. Konoplev (7296_CR10) 2016; 50 H. Wang (7296_CR40) 2006; 1 R.J. McEliece (7296_CR22) 1978; 42–44 D.P. Zegzhda (7296_CR2) 2018; 52 |
| References_xml | – ident: CR18 – ident: CR43 – volume: 6258 start-page: 337 year: 2010 end-page: 344 ident: CR3 article-title: Clarifying integrity control at the trusted information environment publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-642-14706-7_27 – ident: CR14 – ident: CR39 – ident: CR16 – ident: CR37 – ident: CR12 – ident: CR30 – volume: 8 start-page: 1 year: 2014 end-page: 29 ident: CR31 article-title: Constructing elliptic curve isogenies in quantum subexponential time publication-title: J. Math. Cryptol. doi: 10.1515/jmc-2012-0016 – volume: 52 start-page: 1150 year: 2018 end-page: 1159 ident: CR2 article-title: Digital manufacturing security indicators publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411618080333 – ident: CR33 – volume: 22 start-page: 269 year: 2019 end-page: 276 ident: CR42 article-title: Post-Quantum Primitives in Information Security publication-title: Nonlinear Phenomena in Complex Systems – ident: CR35 – ident: CR6 – ident: CR8 – ident: CR25 – ident: CR27 – ident: CR23 – ident: CR21 – volume: 51 start-page: 805 year: 2017 end-page: 816 ident: CR5 article-title: Cyber-physical system homeostatic security management publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411617080260 – ident: CR19 – year: 2009 ident: CR28 doi: 10.1007/978-0-387-09494-6 – volume: 8 start-page: 2138 year: 2013 end-page: 2153 ident: CR38 article-title: Role-based cryptosystem: A new cryptographic RBAC system based on role-key hierarchy publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2013.2287858 – volume: 1 start-page: 127 year: 2006 end-page: 137 ident: CR40 article-title: Elliptic curve cryptography-based access control in sensor networks publication-title: Int. J. Secur. Networks doi: 10.1504/IJSN.2006.011772 – volume: 2603 start-page: 34 year: 2019 end-page: 39 ident: CR1 article-title: Bio-inspired approach to self-regulation for industrial dynamic network infrastructure publication-title: CEUR Workshop Proc. – ident: CR17 – ident: CR13 – ident: CR9 – volume: 50 start-page: 669 year: 2016 end-page: 672 ident: CR11 article-title: Tasks of providing information security in distributed computing networks publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411616080101 – volume: 19 start-page: 115 year: 2006 end-page: 133 ident: CR29 article-title: An elliptic curve trapdoor system publication-title: J. Cryptol. doi: 10.1007/s00145-004-0328-3 – volume: 49 start-page: 673 year: 2015 end-page: 678 ident: CR4 article-title: Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters publication-title: Autom. Control Comput. Sci. doi: 10.3103/S014641161508026X – ident: CR32 – ident: CR34 – ident: CR36 – ident: CR7 – volume: 50 start-page: 664 year: 2016 end-page: 668 ident: CR10 article-title: Access control system for distributed computing networks publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411616080095 – volume: 42–44 start-page: 114 year: 1978 end-page: 116 ident: CR22 article-title: A public-key cryptosystem based on algebraic coding theory publication-title: DSN Prog. Rep. – ident: CR26 – volume: 11 start-page: 599 year: 2009 end-page: 606 ident: CR41 article-title: An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography publication-title: J. Commun. Networks doi: 10.1109/JCN.2009.6388413 – volume: 49 start-page: 679 year: 2015 end-page: 683 ident: CR15 article-title: Access control method in distributed grid computing networks publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411615080088 – ident: CR24 – ident: CR20 – volume-title: The Arithmetic of Elliptic Curves year: 2009 ident: 7296_CR28 doi: 10.1007/978-0-387-09494-6 – ident: 7296_CR36 doi: 10.1109/SP.2007.11 – ident: 7296_CR19 doi: 10.1145/3203217.3206427 – volume: 1 start-page: 127 year: 2006 ident: 7296_CR40 publication-title: Int. J. Secur. Networks doi: 10.1504/IJSN.2006.011772 – volume: 51 start-page: 805 year: 2017 ident: 7296_CR5 publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411617080260 – ident: 7296_CR27 – ident: 7296_CR7 doi: 10.1109/ICPHYS.2019.8780193 – ident: 7296_CR13 – volume: 49 start-page: 679 year: 2015 ident: 7296_CR15 publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411615080088 – volume: 2603 start-page: 34 year: 2019 ident: 7296_CR1 publication-title: CEUR Workshop Proc. – ident: 7296_CR33 doi: 10.1007/978-3-319-11659-4_10 – ident: 7296_CR17 – ident: 7296_CR20 doi: 10.1145/237814.237866 – ident: 7296_CR34 – ident: 7296_CR43 – ident: 7296_CR8 doi: 10.1109/BlackSeaCom.2019.8812818 – volume: 6258 start-page: 337 year: 2010 ident: 7296_CR3 publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-642-14706-7_27 – volume: 49 start-page: 673 year: 2015 ident: 7296_CR4 publication-title: Autom. Control Comput. Sci. doi: 10.3103/S014641161508026X – volume: 22 start-page: 269 year: 2019 ident: 7296_CR42 publication-title: Nonlinear Phenomena in Complex Systems – volume: 42–44 start-page: 114 year: 1978 ident: 7296_CR22 publication-title: DSN Prog. Rep. – ident: 7296_CR32 doi: 10.1007/978-3-642-25405-5_2 – ident: 7296_CR30 – ident: 7296_CR24 – ident: 7296_CR12 doi: 10.1109/ICTC.2016.7763528 – ident: 7296_CR25 doi: 10.1109/SP.2015.40 – ident: 7296_CR26 – volume: 8 start-page: 1 year: 2014 ident: 7296_CR31 publication-title: J. Math. Cryptol. doi: 10.1515/jmc-2012-0016 – ident: 7296_CR23 doi: 10.1109/RED.2016.7779334 – volume: 52 start-page: 1150 year: 2018 ident: 7296_CR2 publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411618080333 – ident: 7296_CR6 – ident: 7296_CR39 doi: 10.1007/978-3-642-19571-6_16 – volume: 19 start-page: 115 year: 2006 ident: 7296_CR29 publication-title: J. Cryptol. doi: 10.1007/s00145-004-0328-3 – volume: 11 start-page: 599 year: 2009 ident: 7296_CR41 publication-title: J. Commun. Networks doi: 10.1109/JCN.2009.6388413 – ident: 7296_CR14 – ident: 7296_CR37 – ident: 7296_CR16 – volume: 8 start-page: 2138 year: 2013 ident: 7296_CR38 publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2013.2287858 – volume: 50 start-page: 669 year: 2016 ident: 7296_CR11 publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411616080101 – ident: 7296_CR9 doi: 10.1109/BlackSeaCom.2018.8433628 – volume: 50 start-page: 664 year: 2016 ident: 7296_CR10 publication-title: Autom. Control Comput. Sci. doi: 10.3103/S0146411616080095 – ident: 7296_CR18 – ident: 7296_CR21 – ident: 7296_CR35 doi: 10.1145/1180405.1180418 |
| SSID | ssj0055886 |
| Score | 2.1686265 |
| Snippet | —
Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic... |
| SourceID | crossref springer |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 803 |
| SubjectTerms | Computer Science Control Structures and Microprogramming |
| Title | Isogeny-Based Cryptographic Access Control |
| URI | https://link.springer.com/article/10.3103/S0146411620080027 |
| Volume | 54 |
| WOSCitedRecordID | wos000619435600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1558-108X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: RSV dateStart: 20070201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60etCD1apYX-zBUyW4m2yy2WMtil6K-KK3JZsHFKQt3VXovzfJ7orFB-h9EsIwyTfDTL4P4EwyZeI0ZihnVCGXESBBTIgMFVwmqcSGVGITyXDIR6P0rv7HXTTT7k1L0r_Uvq4MyYUbQ2JxFDFcZTnJKqxZtONOr-H-4bl5finlXt7RWSNnXrUyv99iGYyWO6EeYK7b_zraNmzV-WTQrwJgB1b0pAPtRqshqK9uBzY_EQ_uQu-2mNrIWaBLC2IqGMwXs7Lirh7LoO81FINBNcS-B0_XV4-DG1SrJiCJOS9RpI0IlcLCMJYnXFqH0NQwpWzhJbnnh2fGUIOFzGMjMMmp1sKBGSYmYpzsQ2synegDCCLBaY410TjVcZqr3CZTYSpjGiV2dyK6EDbuy2RNKe6ULV4yW1o4z2RfPNOF3seSWcWn8ZvxeePvrL5axc_Wh3-yPoIN7EpnP5lyDK1y_qpPYF2-leNifupD6h2xdcDA |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fS8MwED50CuqD06k4f_bBp0mwTZo0fZzDseEcolP2VtI0gYFsY53C_nubtBWHP0DfLyEcl3x33OX7AC4kS7Qf-gzFjCbIZARIEO0iTQWXQSixJrnYRNDv8-EwvC_-cafltHvZkrQvta0rXXJlxpCY73kM51lOsAprfgZYhjD_4fG5fH4p5Vbe0VgjY563Mr_fYhmMljuhFmDa1X8dbQe2i3zSaeYBsAsralyDaqnV4BRXtwZbn4gH96DRTSdZ5CzQdQZiidOaLabznLt6JJ2m1VB0WvkQ-z48tW8GrQ4qVBOQxJzPkae0cJMEC81YHHCZOYSGmiVJVnhJbvnhmdZUYyFjXwtMYqqUMGCGifYYJwdQGU_G6hAcT3AaY0UUDpUfxkmcJVNuKH3qBdnuRNTBLd0XyYJS3ChbvERZaWE8E33xTB0aH0umOZ_Gb8aXpb-j4mqlP1sf_cn6HDY6g7te1Ov2b49hE5sy2k6pnEBlPntVp7Au3-ajdHZmw-sdxR_DpA |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB60iujBalWszxw8VZYmu9nN5lirxaKUgg96C5t9QEHS0kah_95sHmLxAeJ9soRhNjMf8-X7AC4kU8YPfYZiRhWyEwESxLjIUMFlEEpsSGE2EQwGfDQKh6XP6bxiu1cryeKfBqvSlKTtqTLtHGO6pG0pScz3PIaLiSdYhTXf8ugtXH94rj7FlPLc6tFGIxterDW_P2K5MS1vRfNm06v_-zV3YLucM51OURi7sKKTBtQrDwenvNIN2PokSLgHrf58klXUAl1lzU053dlimhaa1mPpdHJvRadbkNv34al389i9RaWbApKY8xR52ghXKSwMY3HAZZYcGhqmVAbIJM9145kx1GAhY98ITGKqtbBNDhPjMU4OoJZMEn0Ijic4jbEmGofaD2MVZ0OWG0qfekF2OhFNcKtURrKUGreOFy9RBjlsZqIvmWlC6-ORaaGz8VvwZZX7qLxy85-jj_4UfQ4bw-tedN8f3B3DJrboOievnEAtnb3qU1iXb-l4PjvLK-0ds1HMiA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Isogeny-Based+Cryptographic+Access+Control&rft.jtitle=Automatic+control+and+computer+sciences&rft.au=Aleksandrova%2C+E.+B.&rft.au=Shtyrkina%2C+A.+A.&rft.au=Yarmak%2C+A.+V.&rft.date=2020-12-01&rft.issn=0146-4116&rft.eissn=1558-108X&rft.volume=54&rft.issue=8&rft.spage=803&rft.epage=812&rft_id=info:doi/10.3103%2FS0146411620080027&rft.externalDBID=n%2Fa&rft.externalDocID=10_3103_S0146411620080027 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0146-4116&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0146-4116&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0146-4116&client=summon |