Asymmetric subversion attacks on signature schemes
From MaRDI portal
Publication:1784469
Recommendations
- Subversion-resilient signatures: definitions, constructions and applications
- Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog
- Protecting electronic signatures in case of key leakage
- Cliptography: clipping the power of kleptographic attacks
- Threshold kleptographic attacks on discrete logarithm based signatures
Cited in
(8)- Subverting decryption in AEAD
- Subversion-resilient signatures: definitions, constructions and applications
- Security of the SM2 signature scheme against generalized key substitution attacks
- Subversion-resilient signatures without random oracles
- Practical algorithm substitution attack on extractable signatures
- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
- Security of auditing protocols against subversion attacks
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
This page was built for publication: Asymmetric subversion attacks on signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784469)