The insecurity of the elliptic curve digital signature algorithm with partially known nonces

From MaRDI portal
Publication:1412249

DOI10.1023/A:1025436905711zbMath1039.94008OpenAlexW1485287820MaRDI QIDQ1412249

Phong Q. Nguyen, Igor E. Shparlinski

Publication date: 10 November 2003

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1023/a:1025436905711




Related Items (30)

Evaluating the Cache Side Channel Attacks Against ECDSANew lattice attacks on DSA schemesA Tale of Three Signatures: Practical Attack of ECDSA with wNAFPartially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmAttacking (EC)DSA Given Only an Implicit HintHidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiationLattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSAInteger LWE with non-subgaussian error and related attacksA hidden number problem in small subgroupsA Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite PhonesThe random oracle model: a twenty-year retrospectiveExponential sums over points of elliptic curvesGeneralized attack on ECDSA: known bits in arbitrary positionsAll shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacksRecovering secrets from prefix-dependent leakageHandle the traces: revisiting the attack on ECDSA with EHNPOn the Security of Supersingular Isogeny CryptosystemsDifferential fault attack on Montgomery ladder and in the presence of scalar randomizationLattice attacks against elliptic-curve signatures with blinded scalar multiplicationThe curious case of the half-half Bitcoin ECDSA noncesSome lattice attacks on DSA and ECDSAKoblitz curve cryptosystemsJust a Little Bit MoreSafe-Errors on SPA Protected Implementations with the Atomicity TechniqueПрименение теории решеток к анализу схем цифровой подписиKoblitz curves over quadratic fieldsA probabilistic analysis on a lattice attack against DSARSA key recovery from digit equivalence informationSecurity of most significant bits of \(g^{x^{2}}\).On the uniformity of distribution of the elliptic curve ElGamal signature.




This page was built for publication: The insecurity of the elliptic curve digital signature algorithm with partially known nonces