The insecurity of the elliptic curve digital signature algorithm with partially known nonces
From MaRDI portal
Publication:1412249
DOI10.1023/A:1025436905711zbMath1039.94008OpenAlexW1485287820MaRDI QIDQ1412249
Phong Q. Nguyen, Igor E. Shparlinski
Publication date: 10 November 2003
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1023/a:1025436905711
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Elliptic curves (14H52) Exponential sums (11T23) Authentication, digital signatures and secret sharing (94A62)
Related Items (30)
Evaluating the Cache Side Channel Attacks Against ECDSA ⋮ New lattice attacks on DSA schemes ⋮ A Tale of Three Signatures: Practical Attack of ECDSA with wNAF ⋮ Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm ⋮ Attacking (EC)DSA Given Only an Implicit Hint ⋮ Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation ⋮ Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA ⋮ Integer LWE with non-subgaussian error and related attacks ⋮ A hidden number problem in small subgroups ⋮ A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones ⋮ The random oracle model: a twenty-year retrospective ⋮ Exponential sums over points of elliptic curves ⋮ Generalized attack on ECDSA: known bits in arbitrary positions ⋮ All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks ⋮ Recovering secrets from prefix-dependent leakage ⋮ Handle the traces: revisiting the attack on ECDSA with EHNP ⋮ On the Security of Supersingular Isogeny Cryptosystems ⋮ Differential fault attack on Montgomery ladder and in the presence of scalar randomization ⋮ Lattice attacks against elliptic-curve signatures with blinded scalar multiplication ⋮ The curious case of the half-half Bitcoin ECDSA nonces ⋮ Some lattice attacks on DSA and ECDSA ⋮ Koblitz curve cryptosystems ⋮ Just a Little Bit More ⋮ Safe-Errors on SPA Protected Implementations with the Atomicity Technique ⋮ Применение теории решеток к анализу схем цифровой подписи ⋮ Koblitz curves over quadratic fields ⋮ A probabilistic analysis on a lattice attack against DSA ⋮ RSA key recovery from digit equivalence information ⋮ Security of most significant bits of \(g^{x^{2}}\). ⋮ On the uniformity of distribution of the elliptic curve ElGamal signature.
This page was built for publication: The insecurity of the elliptic curve digital signature algorithm with partially known nonces