Эта статья является препринтом и не была отрецензирована.
О результатах, изложенных в препринтах, не следует сообщать в СМИ как о проверенной информации.
Оптимизированный метод цифровой подписи на эллиптических кривых для устройств с ограниченными ресурсами
1. The elliptic curve digital signature algorithm (ecdsa) / Don Johnson, Alfred Menezes, and Scott Vanstone // International Journal of Information Security, 1:36–63, 2001. URL: https://doi.org/10.1007/s102070100002
2. Edwards-Curve Digital Signature Algorithm (EdDSA) / Simon Josefsson and Ilari Liusvaara // RFC 8032, January 2017
3. An optimized point multiplication strategy in elliptic curve cryptography for resource-constrained devices / Nawras H Sabbry and Alla B Levina // Mathematics, 12(6):881, 2024. URL: https://www.mdpi.com/2227-7390/12/6/881
4. Twisted edwards curves revisited / Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, and Ed Dawson // In International Conference on the Theory and Application of Cryptology and Information Security, pages 326–343. Springer, 2008. URL: https://link.springer.com/chapter/10.1007/978-3-540-89255-7_20
5. Nonce generation techniques in schnorr multi-signatures: Exploring eddsa-inspired approaches / Nawras H Sabbry and Alla Levina // AIMS Mathematics, 9(8):2030420325, 2024. URL: https://www.aimspress.com/article/doi/10.3934/math.2024988
6. Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices / Shafi Ullah and Raja Zahilah // Cybersecurity, 4:1–13, 2021
7. X2065: Lightweight key exchange for the internet of things / Georgios Fotiadis, Johann Großschädl, and Peter YA Ryan // In Proceedings of the 10th ACM Cyber-Physical System Security Workshop, pages 43–52, 2024
8. Lightweight and resilient signatures for cloud-assisted embedded iot systems / Saif E Nouma and Attila A Yavuz // arXiv preprint arXiv:2409.13937, 2024
9. Ultra lightweight multiple-time digital signature for the internet of things devices / Attila Altay Yavuz and Muslum Ozgur Ozmen // IEEE Transactions on Services Computing, 15(1):215–227, 2019. URL: https://ieeexplore.ieee.org/document/8762164
10. Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms / Christof Paar, Jan Pelzl, and Tim Güneysu // Springer, 2024. URL: https://doi.org/10.1007/978-3-662-69007-9
11. Guide to elliptic curve cryptography / Darrel Hankerson, Scott A. Vanstone, and Alfred Menezes // Springer Professional Computing, 2004
12. Improved elliptic curve multiplication methods resistant against side channel attacks / Tetsuya Izu, Bodo Möller, and Tsuyoshi Takagi // In Progress in Cryptology—INDOCRYPT 2002: Third International Conference on Cryptology in India Hyderabad, India, December 16–18, 2002 Proceedings 3, pages 296–313. Springer, 2002
13. New regular sliding window algorithms for elliptic curve scalar point multiplication / NN Shenets and AS Petushkov // Automatic Control and Computer Sciences, 55(8):1029–1038, 2021
14. Speeding up the pollard’s rho algorithm / Silje Christensen and Simen Johnsrud, 2015
15. Enhancement the chacha20 encryption algorithm based on chaotic maps / Hussain H Alyas and Alharith A Abdullah // In Next Generation of Internet of Things: Proceedings of ICNGIoT 2021, pages 91–107. Springer, 2021
16. Nacl on 8-bit avr microcontrollers / Michael Hutter and Peter Schwabe // In Progress in Cryptology - AFRICACRYPT 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings 6, pages 156–172. Springer, 2013