@incollection{, 9EF0CC8BCCBFABB52003710431567165 , author={{KuryazovD.M.} and {National University of Uzbekistan, Uzbekistan}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2124347 } @book{b0, , title={{Analysis of the software results shows the following: 1. EA on EC increases the size of the cryptogram by 18.44% more than the RSA algorithm, and 2.2 times faster in speed}} } @book{b1, , title={{The optimal EA on the EC increases the volume of the cryptogram by 45% more than the RSA-OAEP algorithm, and 2.4 times faster in speed}} } @incollection{b2, , title={{These results were obtained using a computer with the following configuration: 64-bit Intel (R) Core (TM) 2 Quad CPU Q8400 2.67 GHz, 4 GB RAM. 14-15}} , journal={{Tashkent. Part}} 1 , year={2013} } @incollection{b3, , title={{Algorithm of without key hash-function based on Sponge-scheme}} , author={{ MMAripov } and { DMKuryazov }} , journal={{International Journal of Advances in Computer Science and Technology}} 7 6 , year={June. 2018} } @book{b4, , title={{Directional encryption schemes in groups of points on an elliptic curve}} , author={{ IDGorbenko } and { DSBalagura }} } @book{b5, , title={{A commutative encryption method based on probabilistic coding}} , author={{ NAMoldovyan } and { AVRyzhkov }} } @incollection{b6, , title={{}} , journal={{// Journal of Information Security Issues}} 3 , year={2013} } @book{b7, , title={{Algorithmic foundations of elliptic cryptography}} , author={{ AABolotov } and { SBGashkov } and { Others }} , publisher={MEI} , address={Moscow} } @incollection{b8, , title={{Use of elliptic curves in cryptography // Advances in cryptology-CRYPTO'85}} , author={{ VMiller }} , booktitle={{Lecture Notes in Comput. Sci}} , year={1985. 1986} } @book{b9, , title={{Introduction to elliptic curves and modular forms // Translated from English}} , author={{ NKoblitz }} , year={1988} , publisher={Mir} , address={Moscow} } @incollection{b10, , title={{Optimal asymmetric encryption}} , author={{ MBellare } and { PRogaway }} , booktitle={{Advances in Cryptology-Proceedings of EUROCRYPT'94}} , booktitle={{Lecture Notes in Computer Science}} , editor={ ADe Santis } , publisher={Springer-Verlag} , year={1995} 950 } @book{b11, , author={{ WenboMao }} , title={{Modern cryptography: theory and practice. -M.: Publishing house "Williams}} , year={2005} , note={768 p} } @incollection{b12, , title={{An algorithm for constructing S-boxes for block symmetric encryption}} , author={{ BFAbdurakhimov } and { ABSattarov }} , journal={{/ Universal Journal of Mathematics and Applications}} 1 , year={May 29-32. 2018} } @incollection{b13, , title={{About the algorithm of data encryption BTS}} , author={{ ABSattarov }} , journal={{International Journal of Advances in Computer Science and Technology}} 7 6 , year={June 36-39, 2018} } @book{b14, , title={{Algebraic immunity of Boolean function // Computational technologies}} , author={{ BFAbdurakhimov } and { ABSattarov }} 10.25743/ ICT.2019.24.5.002 , year={2019} } @incollection{b15, , title={{Algorithm for ensuring message confidentiality using elliptic curves // International journal of Advanced Trends in}} , author={{ DMKuryazov }} , journal={{Computer Science and Engineering (IJATCSE)}} 9 1 , year={January -February 2020} }