Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MVK_2021_12_a0, author = {E. K. Alekseev and L. R. Ahmetzyanova and A. A. Bozhko and S. V. Smyshlyaev}, title = {Secure implementation of digital signature using semi-trusted computational core}, journal = {Matemati\v{c}eskie voprosy kriptografii}, pages = {5--23}, publisher = {mathdoc}, volume = {12}, year = {2021}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MVK_2021_12_a0/} }
TY - JOUR AU - E. K. Alekseev AU - L. R. Ahmetzyanova AU - A. A. Bozhko AU - S. V. Smyshlyaev TI - Secure implementation of digital signature using semi-trusted computational core JO - Matematičeskie voprosy kriptografii PY - 2021 SP - 5 EP - 23 VL - 12 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MVK_2021_12_a0/ LA - ru ID - MVK_2021_12_a0 ER -
%0 Journal Article %A E. K. Alekseev %A L. R. Ahmetzyanova %A A. A. Bozhko %A S. V. Smyshlyaev %T Secure implementation of digital signature using semi-trusted computational core %J Matematičeskie voprosy kriptografii %D 2021 %P 5-23 %V 12 %I mathdoc %U http://geodesic.mathdoc.fr/item/MVK_2021_12_a0/ %G ru %F MVK_2021_12_a0
E. K. Alekseev; L. R. Ahmetzyanova; A. A. Bozhko; S. V. Smyshlyaev. Secure implementation of digital signature using semi-trusted computational core. Matematičeskie voprosy kriptografii, Tome 12 (2021), pp. 5-23. http://geodesic.mathdoc.fr/item/MVK_2021_12_a0/
[1] GOST R 34.10-2012 «Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Protsessy formirovaniya i proverki elektronnoi tsifrovoi podpisi», Standartinform, M., 2012
[2] Alekseev E. K., Akhmetzyanova L. R., Oshkin I. B., Smyshlyaev S. V., “Obzor uyazvimostei nekotorykh protokolov vyrabotki obschego klyucha s autentifikatsiei na osnove parolya i printsipy postroeniya protokola SESPAKE”, Matematicheskie voprosy kriptografii, 7:4 (2016), 7–28 | MR | Zbl
[3] Alekseev E. K., Smyshlyaev S. V., “O bezopasnosti protokola SESPAKE”, Prikladnaya diskretnaya matematika, 50 (2020), 5–41 | Zbl
[4] V. V. Yaschenko (red.), Vvedenie v kriptografiyu, Izd. 4-e, dop., MTsNMO, M., 2012, 348 pp.
[5] Boileau A., Ruxcon 2006, Presentation https://papers.put.as/papers/macosx/2006/ab_firewire_rux2k6-final.pdf
[6] Witherden F., Memory forensics over the IEEE 1394 interface, 2010 https://freddie.witherden.org/pages/ieee-1394-forensics.pdf
[7] Hermann U., Physical memory attacks via Firewire/DMA – part 1: Overview and mitigation, 2010 https://firewire14.rssing.com/chan-8600345/all_p1.html
[8] Lenstra A. K., Hughes J. P., Augier M., Bos J. W., Kleinjung T., Wachter C., Ron was wrong, What is right, Cryptology ePrint Archive, Report 2012/064, 2012
[9] Schnorr C. P., “Efficient identification and signatures for smart cards”, CRYPTO'89, Lect. Notes Comput. Sci., 1990, 239–252 | DOI | Zbl
[10] Savage J. E., Models of Computation: Exploring the Power of Computing, Addison-Wesley Longman Publ. Co., Boston, MA, 1997, 672 pp.