23
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Development of electronic digital signature algorithms with compound modules and their cryptanalysis

Pages 1085-1099 | Received 01 Jul 2020, Published online: 20 Apr 2021

References

  • Schneier B. Applied Cryptography. Protocols, algorithms, and source codes in C. - M.: Publishing house TRIUMF, 2003. 816 pages.
  • Aripov M.M., Pudovchenko Yu.E. The basics of cryptology. Tashkent, 2004. 136 pages.
  • Aripov M.M., Kuryazov D.M. Digital signature аlgorithm with composite module, Journal of the Academy of Sciences of the Republic of Uzbekistan. Vol. 4, pages 22-24, 2012.
  • Kharin Yu.S., Bernik V.I., Matveev G.V., Agievich S.V. Mathematical and computer foundations of cryptology: a textbook. - Minsk: New Knowledge 2003. 382 pages.
  • Moldovyan N.A., Guryanov D.Yu. Enhancing blind signature protocol security, Journal Information Security Questions, Vol.4, pages. 3-6, 2012.
  • Dernova Е.С., Moldovyan N.A. Synthesis of digital signature algorithms based on several computationally difficult problems, Journal Information Security Questions Vol. 1, pages. 22-26, 2008.
  • Dernova Е.С., Moldovyan N.A. Collective digital signature protocols based on the complexity of solving two difficult tasks, Journal Information Security Questions, Vol.2, pp.79-85, 2008.
  • Kuryazov D.M. Algorithm for ensuring message confidentiality using elliptic curves, International journal of Advanced Trends in Computer Science and Engineering (IJATCSE) Vol. 9 (1), January - February 2020, pages 295-298. doi.org/10.30534/ijatcse/2020/44912020.
  • Aripov M.M., Kuryazov D.M. Algorithm of without key hash– function based on Sponge-scheme, International Journal of Advances in Computer Science and Technology, Vol. 7(6), June, pages 40-42, 2018. doi.org/10.34534/ijacst/2018/04762018.
  • Aripov M.M., Kuryazov D.M. Signature algorithm the basis of the two independent difficult problems, Collection in the materials of the international scientific conferences, Actual problems of applied mathematics and information technologies. Al-Khorazmiy-2014. Samarkand 15-17 September, 2014. Vol. 2, pages 59-63.
  • Aripov M.M., Kuryazov D.M. About one algorithm of digital signature with increased stability, Collection of materials of the III-International Scientific and Practical Conference, Astana 15-16 October, 2015, pages 35-39.
  • Priyanka Jaiswal & Sachin Tripathi (2018) Cryptanalysis of Olimid’s group key transfer protocol based on secret sharing, Journal of Information and Optimization Sciences, 39:5, 1129-1137, DOI: 10.1080/02522667.2017.1292655.
  • Manoj Kumar Chande, Cheng-Chi Lee & Chun-Ta Li (2018) Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme, Journal of Discrete Mathematical Sciences and Cryptography, 21:1, 23-34, DOI: 10.1080/09720529.2017.1390845.
  • Nissa Mehibel & M’hamed Hamadouche (2020) A new enhancement of elliptic curve digital signature algorithm, Journal of Discrete Mathematical Sciences and Cryptography, 23:3, 743-757, DOI: 10.1080/09720529.2019.1615673.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.