Isogeny-Based Cryptographic Access Control

— Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the discrete logarithm and integer factorization problems, whi...

Full description

Saved in:
Bibliographic Details
Published in:Automatic control and computer sciences Vol. 54; no. 8; pp. 803 - 812
Main Authors: Aleksandrova, E. B., Shtyrkina, A. A., Yarmak, A. V.
Format: Journal Article
Language:English
Published: Moscow Pleiades Publishing 01.12.2020
Subjects:
ISSN:0146-4116, 1558-108X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract — Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the discrete logarithm and integer factorization problems, which are the basis of most modern public-key cryptosystems. In this regard, there is a need to search for new problems that are resistant to attacks on both classical computers and quantum computers. Computing the isogenies of supersingular elliptic curves is one of the most challenging problems. A scheme for cryptographic access control based on isogenies is proposed. Security analysis of the protocol and the results of practical implementation in the SAGE computer algebra system are given.
AbstractList — Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic primitives. A quantum computer of sufficient capacity allows solving in polynomial time the discrete logarithm and integer factorization problems, which are the basis of most modern public-key cryptosystems. In this regard, there is a need to search for new problems that are resistant to attacks on both classical computers and quantum computers. Computing the isogenies of supersingular elliptic curves is one of the most challenging problems. A scheme for cryptographic access control based on isogenies is proposed. Security analysis of the protocol and the results of practical implementation in the SAGE computer algebra system are given.
Author Yarmak, A. V.
Shtyrkina, A. A.
Aleksandrova, E. B.
Author_xml – sequence: 1
  givenname: E. B.
  surname: Aleksandrova
  fullname: Aleksandrova, E. B.
  email: helen@ibks.spbstu.ru
  organization: Peter the Great St. Petersburg Polytechnic University
– sequence: 2
  givenname: A. A.
  surname: Shtyrkina
  fullname: Shtyrkina, A. A.
  email: anna_sh@ibks.spbstu.ru
  organization: Peter the Great St. Petersburg Polytechnic University
– sequence: 3
  givenname: A. V.
  surname: Yarmak
  fullname: Yarmak, A. V.
  email: yarmak.av@ibks.spbstu.ru
  organization: Peter the Great St. Petersburg Polytechnic University
BookMark eNp9jz1PwzAQhi1UJNLCD2DLjBS4sx3HHUvER6VKDIDEFjmOHVIFO7LD0H9PojKB1OmG95737lmShfPOEHKNcMsQ2N0rIBccUVAACUCLM5JgnssMQX4sSDLH2ZxfkGWMe4ApkyIhN9voW-MO2b2KpknLcBhG3wY1fHY63WhtYkxL78bg-0tyblUfzdXvXJH3x4e38jnbvTxty80u01TKMUNjFTQNVVaIupB6OpSvrWgaBK4l42uRC2tzS5WuuVWU1bkxinFklFkUkq1IcezVwccYjK10N6qxm79QXV8hVLNy9U95IvEPOYTuS4XDSYYemTjtutaEau-_g5sET0A_d3xoPw
CitedBy_id crossref_primary_10_1155_2021_9994200
Cites_doi 10.1007/978-3-642-14706-7_27
10.1515/jmc-2012-0016
10.3103/S0146411618080333
10.3103/S0146411617080260
10.1007/978-0-387-09494-6
10.1109/TIFS.2013.2287858
10.1504/IJSN.2006.011772
10.3103/S0146411616080101
10.1007/s00145-004-0328-3
10.3103/S014641161508026X
10.3103/S0146411616080095
10.1109/JCN.2009.6388413
10.3103/S0146411615080088
10.1109/SP.2007.11
10.1145/3203217.3206427
10.1109/ICPHYS.2019.8780193
10.1007/978-3-319-11659-4_10
10.1145/237814.237866
10.1109/BlackSeaCom.2019.8812818
10.1007/978-3-642-25405-5_2
10.1109/ICTC.2016.7763528
10.1109/SP.2015.40
10.1109/RED.2016.7779334
10.1007/978-3-642-19571-6_16
10.1109/BlackSeaCom.2018.8433628
10.1145/1180405.1180418
ContentType Journal Article
Copyright Allerton Press, Inc. 2020. ISSN 0146-4116, Automatic Control and Computer Sciences, 2020, Vol. 54, No. 8, pp. 803–812. © Allerton Press, Inc., 2020. Russian Text © The Author(s), 2020, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
Copyright_xml – notice: Allerton Press, Inc. 2020. ISSN 0146-4116, Automatic Control and Computer Sciences, 2020, Vol. 54, No. 8, pp. 803–812. © Allerton Press, Inc., 2020. Russian Text © The Author(s), 2020, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
DBID AAYXX
CITATION
DOI 10.3103/S0146411620080027
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1558-108X
EndPage 812
ExternalDocumentID 10_3103_S0146411620080027
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
-~X
.86
.VR
06D
0R~
0VY
1N0
23N
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
4.4
408
40D
40E
5GY
5VS
6NX
8TC
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACCUX
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADRFC
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEMSY
AEOHA
AEPYU
AETLH
AEVLU
AEXYK
AFBBN
AFFNX
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AI.
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
AXYYD
B-.
BA0
BDATZ
BGNMA
CAG
COF
CS3
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
H13
HF~
HG6
HLICF
HMJXF
HRMNR
HZ~
IJ-
IKXTQ
IWAJR
I~X
I~Z
J-C
JBSCW
JZLTJ
KOV
LLZTM
M4Y
MA-
NPVJJ
NQJWS
NU0
O9-
O93
O9J
P9O
PF0
PT4
QOS
R89
R9I
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TN5
TSG
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
VH1
W48
WK8
XU3
YLTOR
Z7R
Z83
Z88
ZMTXR
~A9
AAPKM
AAYXX
ABDBE
ABFSG
ABJCF
ABRTQ
ACSTC
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
K7-
M7S
PHGZM
PHGZT
PQGLB
PTHSS
ID FETCH-LOGICAL-c288t-1efa0dd2af66b78c55859f6dd104c8349656ff5f2acb4fa23b5eea341323f1683
IEDL.DBID RSV
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000619435600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0146-4116
IngestDate Sat Nov 29 05:52:10 EST 2025
Tue Nov 18 22:19:38 EST 2025
Fri Feb 21 02:49:16 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords postquantum cryptography
cryptography
cryptographic access control
isogenies of elliptic curves
elliptic curves
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c288t-1efa0dd2af66b78c55859f6dd104c8349656ff5f2acb4fa23b5eea341323f1683
PageCount 10
ParticipantIDs crossref_citationtrail_10_3103_S0146411620080027
crossref_primary_10_3103_S0146411620080027
springer_journals_10_3103_S0146411620080027
PublicationCentury 2000
PublicationDate 20201200
2020-12-00
PublicationDateYYYYMMDD 2020-12-01
PublicationDate_xml – month: 12
  year: 2020
  text: 20201200
PublicationDecade 2020
PublicationPlace Moscow
PublicationPlace_xml – name: Moscow
PublicationTitle Automatic control and computer sciences
PublicationTitleAbbrev Aut. Control Comp. Sci
PublicationYear 2020
Publisher Pleiades Publishing
Publisher_xml – name: Pleiades Publishing
References Le (CR41) 2009; 11
Childs, Jao, Soukharev (CR31) 2014; 8
CR19
CR18
CR17
CR39
CR16
Kalinin, Pavlenko (CR4) 2015; 49
Konoplev, Kalinin (CR10) 2016; 50
CR37
CR14
CR36
CR13
Teske (CR29) 2006; 19
CR35
CR12
CR34
Lavrova, Zaitceva, Zegzhda (CR1) 2019; 2603
CR33
CR32
CR30
Konoplev, Kalinin (CR15) 2015; 49
McEliece (CR22) 1978; 42–44
Zegzhda, Pavlenko (CR5) 2017; 51
Konoplev, Kalinin (CR11) 2016; 50
CR6
CR8
CR7
Zegzhda, Zegzhda, Kalinin (CR3) 2010; 6258
CR9
CR27
CR26
CR25
CR24
Aleksandrova, Shtyrkina, Iarmak (CR42) 2019; 22
CR23
CR21
CR43
CR20
Wang, Sheng, Li (CR40) 2006; 1
Silverman (CR28) 2009
Zhu (CR38) 2013; 8
Zegzhda, Pavlenko (CR2) 2018; 52
M.O. Kalinin (7296_CR4) 2015; 49
7296_CR30
7296_CR32
Y. Zhu (7296_CR38) 2013; 8
7296_CR12
7296_CR34
7296_CR33
7296_CR14
7296_CR36
7296_CR13
7296_CR35
A.S. Konoplev (7296_CR11) 2016; 50
7296_CR16
7296_CR37
E.B. Aleksandrova (7296_CR42) 2019; 22
7296_CR18
J.H. Silverman (7296_CR28) 2009
7296_CR17
7296_CR39
7296_CR19
A.S. Konoplev (7296_CR15) 2015; 49
D.P. Zegzhda (7296_CR5) 2017; 51
X.H. Le (7296_CR41) 2009; 11
E. Teske (7296_CR29) 2006; 19
A. Childs (7296_CR31) 2014; 8
D. Lavrova (7296_CR1) 2019; 2603
7296_CR7
7296_CR6
7296_CR9
7296_CR8
7296_CR21
7296_CR43
7296_CR20
7296_CR23
7296_CR25
7296_CR24
7296_CR27
D.P. Zegzhda (7296_CR3) 2010; 6258
7296_CR26
A.S. Konoplev (7296_CR10) 2016; 50
H. Wang (7296_CR40) 2006; 1
R.J. McEliece (7296_CR22) 1978; 42–44
D.P. Zegzhda (7296_CR2) 2018; 52
References_xml – ident: CR18
– ident: CR43
– volume: 6258
  start-page: 337
  year: 2010
  end-page: 344
  ident: CR3
  article-title: Clarifying integrity control at the trusted information environment
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-642-14706-7_27
– ident: CR14
– ident: CR39
– ident: CR16
– ident: CR37
– ident: CR12
– ident: CR30
– volume: 8
  start-page: 1
  year: 2014
  end-page: 29
  ident: CR31
  article-title: Constructing elliptic curve isogenies in quantum subexponential time
  publication-title: J. Math. Cryptol.
  doi: 10.1515/jmc-2012-0016
– volume: 52
  start-page: 1150
  year: 2018
  end-page: 1159
  ident: CR2
  article-title: Digital manufacturing security indicators
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411618080333
– ident: CR33
– volume: 22
  start-page: 269
  year: 2019
  end-page: 276
  ident: CR42
  article-title: Post-Quantum Primitives in Information Security
  publication-title: Nonlinear Phenomena in Complex Systems
– ident: CR35
– ident: CR6
– ident: CR8
– ident: CR25
– ident: CR27
– ident: CR23
– ident: CR21
– volume: 51
  start-page: 805
  year: 2017
  end-page: 816
  ident: CR5
  article-title: Cyber-physical system homeostatic security management
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411617080260
– ident: CR19
– year: 2009
  ident: CR28
  doi: 10.1007/978-0-387-09494-6
– volume: 8
  start-page: 2138
  year: 2013
  end-page: 2153
  ident: CR38
  article-title: Role-based cryptosystem: A new cryptographic RBAC system based on role-key hierarchy
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2013.2287858
– volume: 1
  start-page: 127
  year: 2006
  end-page: 137
  ident: CR40
  article-title: Elliptic curve cryptography-based access control in sensor networks
  publication-title: Int. J. Secur. Networks
  doi: 10.1504/IJSN.2006.011772
– volume: 2603
  start-page: 34
  year: 2019
  end-page: 39
  ident: CR1
  article-title: Bio-inspired approach to self-regulation for industrial dynamic network infrastructure
  publication-title: CEUR Workshop Proc.
– ident: CR17
– ident: CR13
– ident: CR9
– volume: 50
  start-page: 669
  year: 2016
  end-page: 672
  ident: CR11
  article-title: Tasks of providing information security in distributed computing networks
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411616080101
– volume: 19
  start-page: 115
  year: 2006
  end-page: 133
  ident: CR29
  article-title: An elliptic curve trapdoor system
  publication-title: J. Cryptol.
  doi: 10.1007/s00145-004-0328-3
– volume: 49
  start-page: 673
  year: 2015
  end-page: 678
  ident: CR4
  article-title: Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S014641161508026X
– ident: CR32
– ident: CR34
– ident: CR36
– ident: CR7
– volume: 50
  start-page: 664
  year: 2016
  end-page: 668
  ident: CR10
  article-title: Access control system for distributed computing networks
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411616080095
– volume: 42–44
  start-page: 114
  year: 1978
  end-page: 116
  ident: CR22
  article-title: A public-key cryptosystem based on algebraic coding theory
  publication-title: DSN Prog. Rep.
– ident: CR26
– volume: 11
  start-page: 599
  year: 2009
  end-page: 606
  ident: CR41
  article-title: An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
  publication-title: J. Commun. Networks
  doi: 10.1109/JCN.2009.6388413
– volume: 49
  start-page: 679
  year: 2015
  end-page: 683
  ident: CR15
  article-title: Access control method in distributed grid computing networks
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411615080088
– ident: CR24
– ident: CR20
– volume-title: The Arithmetic of Elliptic Curves
  year: 2009
  ident: 7296_CR28
  doi: 10.1007/978-0-387-09494-6
– ident: 7296_CR36
  doi: 10.1109/SP.2007.11
– ident: 7296_CR19
  doi: 10.1145/3203217.3206427
– volume: 1
  start-page: 127
  year: 2006
  ident: 7296_CR40
  publication-title: Int. J. Secur. Networks
  doi: 10.1504/IJSN.2006.011772
– volume: 51
  start-page: 805
  year: 2017
  ident: 7296_CR5
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411617080260
– ident: 7296_CR27
– ident: 7296_CR7
  doi: 10.1109/ICPHYS.2019.8780193
– ident: 7296_CR13
– volume: 49
  start-page: 679
  year: 2015
  ident: 7296_CR15
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411615080088
– volume: 2603
  start-page: 34
  year: 2019
  ident: 7296_CR1
  publication-title: CEUR Workshop Proc.
– ident: 7296_CR33
  doi: 10.1007/978-3-319-11659-4_10
– ident: 7296_CR17
– ident: 7296_CR20
  doi: 10.1145/237814.237866
– ident: 7296_CR34
– ident: 7296_CR43
– ident: 7296_CR8
  doi: 10.1109/BlackSeaCom.2019.8812818
– volume: 6258
  start-page: 337
  year: 2010
  ident: 7296_CR3
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-642-14706-7_27
– volume: 49
  start-page: 673
  year: 2015
  ident: 7296_CR4
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S014641161508026X
– volume: 22
  start-page: 269
  year: 2019
  ident: 7296_CR42
  publication-title: Nonlinear Phenomena in Complex Systems
– volume: 42–44
  start-page: 114
  year: 1978
  ident: 7296_CR22
  publication-title: DSN Prog. Rep.
– ident: 7296_CR32
  doi: 10.1007/978-3-642-25405-5_2
– ident: 7296_CR30
– ident: 7296_CR24
– ident: 7296_CR12
  doi: 10.1109/ICTC.2016.7763528
– ident: 7296_CR25
  doi: 10.1109/SP.2015.40
– ident: 7296_CR26
– volume: 8
  start-page: 1
  year: 2014
  ident: 7296_CR31
  publication-title: J. Math. Cryptol.
  doi: 10.1515/jmc-2012-0016
– ident: 7296_CR23
  doi: 10.1109/RED.2016.7779334
– volume: 52
  start-page: 1150
  year: 2018
  ident: 7296_CR2
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411618080333
– ident: 7296_CR6
– ident: 7296_CR39
  doi: 10.1007/978-3-642-19571-6_16
– volume: 19
  start-page: 115
  year: 2006
  ident: 7296_CR29
  publication-title: J. Cryptol.
  doi: 10.1007/s00145-004-0328-3
– volume: 11
  start-page: 599
  year: 2009
  ident: 7296_CR41
  publication-title: J. Commun. Networks
  doi: 10.1109/JCN.2009.6388413
– ident: 7296_CR14
– ident: 7296_CR37
– ident: 7296_CR16
– volume: 8
  start-page: 2138
  year: 2013
  ident: 7296_CR38
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2013.2287858
– volume: 50
  start-page: 669
  year: 2016
  ident: 7296_CR11
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411616080101
– ident: 7296_CR9
  doi: 10.1109/BlackSeaCom.2018.8433628
– volume: 50
  start-page: 664
  year: 2016
  ident: 7296_CR10
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/S0146411616080095
– ident: 7296_CR18
– ident: 7296_CR21
– ident: 7296_CR35
  doi: 10.1145/1180405.1180418
SSID ssj0055886
Score 2.1685224
Snippet — Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 803
SubjectTerms Computer Science
Control Structures and Microprogramming
Title Isogeny-Based Cryptographic Access Control
URI https://link.springer.com/article/10.3103/S0146411620080027
Volume 54
WOSCitedRecordID wos000619435600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: RSV
  dateStart: 20070201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7o9EEfnE7FeaMPPk2CbdKk6eMcir4M8cbeSi4NDGQbaxX2703SVhxeQN9PQ_k4yZfDOfk-gDOnIEOpIIglKkFOkBxxqQ1SlgtDHkcqkaE3m0iGQz4apXf1O-6imXZvWpL-pPZ1ZUgu3BgSi6OI4eqWk6zCmmU77vwa7h-em-OXUu7tHV00cuFVK_P7JZbJaLkT6gnmuv2vX9uGrfo-GfSrBNiBlXzSgXbj1RDUW7cDm5-EB3ehd1tMbeYs0KUlMR0M5otZWWlXj1XQ9x6KwaAaYt-Dp-urx8ENql0TkMKclyjKjQi1xsIwJhOuLCA0NUxrW3gp7vXhmTHUYKFkbAQmkua5cGSGiYkYJ_vQmkwn-QEEQlqu4sJQEcmYayO5SjU3hDCZm1TRLoQNfJmqJcWds8VLZksLh0z2BZku9D4-mVV6Gr8Fnzd4Z_XWKn6OPvxT9BFsYFc6-8mUY2iV89f8BNbVWzku5qc-pd4BdMDA2Q
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60CurBalWszz14qgT3lWx6rMXSYi2iVXpb8thAQdrSXYX-e5Psrlh8gN5nw_IxyZdhJt8HcGEUZDBmASKRiJARJEeUS4WE5kKXhp6IuGvNJqLBgI5GzfviHXdaTruXLUl7Utu60g2uzBgSCT2P-PktJ1qFtVATlhHMf3h8Lo9fjKm1dzTRyITnrczvl1gmo-VOqCWYTvVfv7YD28V90mnlCbALK8mkBtXSq8Eptm4Ntj4JD-5Bo5dOdeYs0LUmMem054tZlmtXj4XTsh6KTjsfYt-Hp87NsN1FhWsCEj6lGfISxVwpfaYI4REVGhDcVERKXXgJavXhiVJY-UzwUDE_4DhJmCEzP1AeocEBVCbTSXIIDuOaqyhTmHk8pFJxKpqSqiAgPFFNgevglvDFopAUN84WL7EuLQwy8Rdk6tD4-GSW62n8FnxZ4h0XWyv9OfroT9HnsNEd3vXjfm9wewybvimj7ZTKCVSy-WtyCuviLRun8zObXu-JlsO9
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFD7oFNEHp1NxXvvg0ySst6Tp45wOhzIGXthbyaWBgXSjrcL-vU3aisMLiO-noRxO8uVwvnwfwIVWkMGYeYgEIkBakBxRLhUSBRba1HdEwG1jNhGMRnQyCceVz2lWs93rkWT5pkGrNCV5dy5V1_SYttfVlCTiOw5xyxtPsAprvubR63b94bk-ijGmxupRRyMdXo41v19iGZiWp6IGbAbNf__mDmxX90yrVxbGLqzESQuatYeDVW3pFmx9EiTcg84wmxUVtUBXBbhJq58u5nmpaT0VVs94K1r9kty-D0-Dm8f-LarcFJBwKc2REytmS-kyRQgPqCiSg0NFpCwaMkGNbjxRCiuXCe4r5nocxzHTIOd6yiHUO4BGMkviQ7AYLzCMMoWZw30qFacilFR5HuGxCgVug12nMhKV1Lh2vHiJipZDZyb6kpk2dD4-mZc6G78FX9a5j6otl_0cffSn6HPYGF8Povvh6O4YNl3dXRvyygk08vQ1PoV18ZZPs_TMVNo7ZifMoQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Isogeny-Based+Cryptographic+Access+Control&rft.jtitle=Automatic+control+and+computer+sciences&rft.au=Aleksandrova%2C+E.+B.&rft.au=Shtyrkina%2C+A.+A.&rft.au=Yarmak%2C+A.+V.&rft.date=2020-12-01&rft.pub=Pleiades+Publishing&rft.issn=0146-4116&rft.eissn=1558-108X&rft.volume=54&rft.issue=8&rft.spage=803&rft.epage=812&rft_id=info:doi/10.3103%2FS0146411620080027&rft.externalDocID=10_3103_S0146411620080027
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0146-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0146-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0146-4116&client=summon