ANALYSIS OF ELLIPTIC CURVES FOR CRYPTOGRAPHIC APPLICATIONS DEDICATED TO DEVICES WITH LIMITED COMPUTATIONAL RESOURCES
The dynamic development of the Internet of Things infrastructure contributes to the need for a new
look at the methods of protecting information transmission. Most modern systems were designed for devices with
easy access to power. Very often the Internet of Things devices have both limited computing power and very
limited energy resources. These conditions contribute to the need to optimize the computing costs of algorithms
which ensure communication protection. The purpose of the following work is to provide a concise introduction
of the properties of certain algebraic groups generated by the most popular elliptic curve subfamilies and a
comparison of the computational costs of the arithmetic operations of adding and doubling points in these groups.
Papers must be accompanied by the following submission letter (form available at journal’s website), signed by all Authors: Declaration
Author, who submits the paper, bears the main responsibility for given data. „Ghostwriting” and „guest authorship” are the symptoms of scientific dishonesty, and all discovered cases will be exposed, including informing suitable entities. Authors are also required to fill in De Gruyter Open Access License. The form should be sent to the Editorial Office via electronic mail to the e-mail address: firstname.lastname@example.org.