Elliptisten käyrien kryptografiaa

Tutkielma johdattelee elliptisten käyrien teoriaan ja kryptografisiin sovelluksiin kompleksianalyysin kautta. Perusteorian jälkeen käsitellään elliptisiä käyriä äärellisissä kunnissa, ja esitellään kryptografisiin sovelluksiin vaadittavia tuloksia. Lopuksi käydään läpi tärkeimpiä elliptisiin käyriin...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Kotilainen, Pyry
Muut tekijät: Matemaattis-luonnontieteellinen tiedekunta, Faculty of Sciences, Matematiikan ja tilastotieteen laitos, Department of Mathematics and Statistics, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Pro gradu
Kieli:fin
Julkaistu: 2019
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/64322
_version_ 1828193081623576576
author Kotilainen, Pyry
author2 Matemaattis-luonnontieteellinen tiedekunta Faculty of Sciences Matematiikan ja tilastotieteen laitos Department of Mathematics and Statistics Jyväskylän yliopisto University of Jyväskylä
author_facet Kotilainen, Pyry Matemaattis-luonnontieteellinen tiedekunta Faculty of Sciences Matematiikan ja tilastotieteen laitos Department of Mathematics and Statistics Jyväskylän yliopisto University of Jyväskylä Kotilainen, Pyry Matemaattis-luonnontieteellinen tiedekunta Faculty of Sciences Matematiikan ja tilastotieteen laitos Department of Mathematics and Statistics Jyväskylän yliopisto University of Jyväskylä
author_sort Kotilainen, Pyry
datasource_str_mv jyx
description Tutkielma johdattelee elliptisten käyrien teoriaan ja kryptografisiin sovelluksiin kompleksianalyysin kautta. Perusteorian jälkeen käsitellään elliptisiä käyriä äärellisissä kunnissa, ja esitellään kryptografisiin sovelluksiin vaadittavia tuloksia. Lopuksi käydään läpi tärkeimpiä elliptisiin käyriin perustuvia salausmenetelmiä, sekä niiden heikkouksia ja niitä vastaan kehitettyjä hyökkäyksiä.
first_indexed 2019-09-20T09:13:06Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Lehtonen, Ari", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kotilainen, Pyry", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-06-04T11:20:58Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-06-04T11:20:58Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64322", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielma johdattelee elliptisten k\u00e4yrien teoriaan ja kryptografisiin sovelluksiin kompleksianalyysin kautta. Perusteorian j\u00e4lkeen k\u00e4sitell\u00e4\u00e4n elliptisi\u00e4 k\u00e4yri\u00e4 \u00e4\u00e4rellisiss\u00e4 kunnissa, ja esitell\u00e4\u00e4n kryptografisiin sovelluksiin vaadittavia tuloksia. Lopuksi k\u00e4yd\u00e4\u00e4n l\u00e4pi t\u00e4rkeimpi\u00e4 elliptisiin k\u00e4yriin perustuvia salausmenetelmi\u00e4, sek\u00e4 niiden heikkouksia ja niit\u00e4 vastaan kehitettyj\u00e4 hy\u00f6kk\u00e4yksi\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-06-04T11:20:58Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-06-04T11:20:58Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "71", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "elliptinen k\u00e4yr\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "elliptinen kuvaus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kryptografia", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Elliptisten k\u00e4yrien kryptografiaa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201906042930", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Matemaattis-luonnontieteellinen tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Sciences", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Matematiikan ja tilastotieteen laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Mathematics and Statistics", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Matematiikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematics", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "4041", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_64322
language fin
last_indexed 2025-03-31T20:01:14Z
main_date 2019-01-01T00:00:00Z
main_date_str 2019
publishDate 2019
record_format qdc
source_str_mv jyx
spellingShingle Kotilainen, Pyry Elliptisten käyrien kryptografiaa elliptinen käyrä elliptinen kuvaus kryptografia Matematiikka Mathematics 4041
title Elliptisten käyrien kryptografiaa
title_full Elliptisten käyrien kryptografiaa
title_fullStr Elliptisten käyrien kryptografiaa Elliptisten käyrien kryptografiaa
title_full_unstemmed Elliptisten käyrien kryptografiaa Elliptisten käyrien kryptografiaa
title_short Elliptisten käyrien kryptografiaa
title_sort elliptisten käyrien kryptografiaa
title_txtP Elliptisten käyrien kryptografiaa
topic elliptinen käyrä elliptinen kuvaus kryptografia Matematiikka Mathematics 4041
topic_facet 4041 Matematiikka Mathematics elliptinen kuvaus elliptinen käyrä kryptografia
url https://jyx.jyu.fi/handle/123456789/64322 http://www.urn.fi/URN:NBN:fi:jyu-201906042930
work_keys_str_mv AT kotilainenpyry elliptistenkäyrienkryptografiaa