Embedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool
| dc.contributor.author | Nurullaev Mirkhon Muhammadovich | |
| dc.date.accessioned | 2026-01-02T12:08:38Z | |
| dc.date.issued | 2023-04-17 | |
| dc.description.abstract | In this article, we will discuss the functions of embedding algorithms for generating and verifying EDS in a cryptographic information security tool. Electronic Data Signatures (EDS) are crucial components of modern cryptographic information security tools. They provide authentication, integrity, and non-repudiation of electronic data, ensuring that the data has not been tampered with during transmission or storage. EDS are generated using a combination of hashing algorithms and digital signatures, which are then embedded into the electronic data. | |
| dc.format | application/pdf | |
| dc.identifier.uri | https://geniusjournals.org/index.php/ejet/article/view/3918 | |
| dc.identifier.uri | https://asianeducationindex.com/handle/123456789/78685 | |
| dc.language.iso | eng | |
| dc.publisher | Genius Journals | |
| dc.relation | https://geniusjournals.org/index.php/ejet/article/view/3918/3320 | |
| dc.rights | https://creativecommons.org/licenses/by-nc/4.0 | |
| dc.source | Eurasian Journal of Engineering and Technology; Vol. 17 (2023): EJET; 51-55 | |
| dc.source | 2795-7640 | |
| dc.subject | EDS | |
| dc.subject | cryptographic information security tool | |
| dc.subject | functions of EDS | |
| dc.title | Embedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool | |
| dc.type | info:eu-repo/semantics/article | |
| dc.type | info:eu-repo/semantics/publishedVersion | |
| dc.type | Peer-reviewed Article |
item.page.files
item.page.filesection.original.bundle
pagination.showing.detail
loading.default
- item.page.filesection.name
- muhammadovich_2023_embedding_algorithms_for_generating_and.pdf
- item.page.filesection.size
- 374.05 KB
- item.page.filesection.format
- Adobe Portable Document Format