The insecurity of the digital signature algorithm with partially known nonces

From MaRDI portal
Revision as of 11:05, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1849602

DOI10.1007/s00145-002-0021-3zbMath1009.94011OpenAlexW2058546698MaRDI QIDQ1849602

Igor E. Shparlinski, Phong Q. Nguyen

Publication date: 1 December 2002

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-002-0021-3




Related Items (30)

Evaluating the Cache Side Channel Attacks Against ECDSAA DSA-like digital signature protocolNew lattice attacks on DSA schemesPartially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmAttacking (EC)DSA Given Only an Implicit HintHidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiationAttacking ECDSA leaking discrete bits with a more efficient latticeInteger LWE with non-subgaussian error and related attacksA Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite PhonesHow to eat your entropy and have it too: optimal recovery strategies for compromised RNGsAll shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacksOn the bit security of the weak Diffie-Hellman problemOn the Security of Supersingular Isogeny CryptosystemsLattice attacks against elliptic-curve signatures with blinded scalar multiplicationSome lattice attacks on DSA and ECDSALimits of a conjecture on a leakage-resilient cryptosystemOn the Bit Security of Elliptic Curve Diffie–HellmanJust a Little Bit MoreAnother look at HMQVBitcoin private key locked transactionsPredicting Lattice ReductionA variant of digital signature algorithmПрименение теории решеток к анализу схем цифровой подписиOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemNoisy Chinese remaindering in the Lee normUnnamed ItemA probabilistic analysis on a lattice attack against DSAGeneric groups, collision resistance, and ECDSARSA key recovery from digit equivalence informationOn the uniformity of distribution of the elliptic curve ElGamal signature.






This page was built for publication: The insecurity of the digital signature algorithm with partially known nonces