The insecurity of the digital signature algorithm with partially known nonces
From MaRDI portal
Publication:1849602
DOI10.1007/s00145-002-0021-3zbMath1009.94011OpenAlexW2058546698MaRDI QIDQ1849602
Igor E. Shparlinski, Phong Q. Nguyen
Publication date: 1 December 2002
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-002-0021-3
Cryptography (94A60) Lattices and convex bodies (number-theoretic aspects) (11H06) Authentication, digital signatures and secret sharing (94A62)
Related Items (30)
Evaluating the Cache Side Channel Attacks Against ECDSA ⋮ A DSA-like digital signature protocol ⋮ New lattice attacks on DSA schemes ⋮ Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm ⋮ Attacking (EC)DSA Given Only an Implicit Hint ⋮ Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation ⋮ Attacking ECDSA leaking discrete bits with a more efficient lattice ⋮ Integer LWE with non-subgaussian error and related attacks ⋮ A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones ⋮ How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs ⋮ All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks ⋮ On the bit security of the weak Diffie-Hellman problem ⋮ On the Security of Supersingular Isogeny Cryptosystems ⋮ Lattice attacks against elliptic-curve signatures with blinded scalar multiplication ⋮ Some lattice attacks on DSA and ECDSA ⋮ Limits of a conjecture on a leakage-resilient cryptosystem ⋮ On the Bit Security of Elliptic Curve Diffie–Hellman ⋮ Just a Little Bit More ⋮ Another look at HMQV ⋮ Bitcoin private key locked transactions ⋮ Predicting Lattice Reduction ⋮ A variant of digital signature algorithm ⋮ Применение теории решеток к анализу схем цифровой подписи ⋮ On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem ⋮ Noisy Chinese remaindering in the Lee norm ⋮ Unnamed Item ⋮ A probabilistic analysis on a lattice attack against DSA ⋮ Generic groups, collision resistance, and ECDSA ⋮ RSA key recovery from digit equivalence information ⋮ On the uniformity of distribution of the elliptic curve ElGamal signature.
This page was built for publication: The insecurity of the digital signature algorithm with partially known nonces