The insecurity of the digital signature algorithm with partially known nonces

From MaRDI portal
Publication:1849602


DOI10.1007/s00145-002-0021-3zbMath1009.94011MaRDI QIDQ1849602

Igor E. Shparlinski, Phong Q. Nguyen

Publication date: 1 December 2002

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-002-0021-3


94A60: Cryptography

11H06: Lattices and convex bodies (number-theoretic aspects)

94A62: Authentication, digital signatures and secret sharing


Related Items

Unnamed Item, Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation, Evaluating the Cache Side Channel Attacks Against ECDSA, A DSA-like digital signature protocol, Another look at HMQV, Predicting Lattice Reduction, On the Bit Security of Elliptic Curve Diffie–Hellman, All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks, New lattice attacks on DSA schemes, On the bit security of the weak Diffie-Hellman problem, Some lattice attacks on DSA and ECDSA, A variant of digital signature algorithm, How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs, Lattice attacks against elliptic-curve signatures with blinded scalar multiplication, Bitcoin private key locked transactions, Noisy Chinese remaindering in the Lee norm, On the uniformity of distribution of the elliptic curve ElGamal signature., On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem, RSA key recovery from digit equivalence information, Attacking ECDSA leaking discrete bits with a more efficient lattice, Integer LWE with non-subgaussian error and related attacks, A probabilistic analysis on a lattice attack against DSA, Limits of a conjecture on a leakage-resilient cryptosystem, Generic groups, collision resistance, and ECDSA, Just a Little Bit More, A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones, On the Security of Supersingular Isogeny Cryptosystems, Применение теории решеток к анализу схем цифровой подписи, Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm, Attacking (EC)DSA Given Only an Implicit Hint