Biased nonce sense: lattice attacks against weak ECDSA signatures in cryptocurrencies
From MaRDI portal
Publication:2656908
DOI10.1007/978-3-030-32101-7_1zbMATH Open1460.94039OpenAlexW2979371882MaRDI QIDQ2656908FDOQ2656908
Authors: Joachim Breitner, Nadia Heninger
Publication date: 17 March 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-32101-7_1
Recommendations
- The insecurity of the elliptic curve digital signature algorithm with partially known nonces
- scientific article; zbMATH DE number 1848387
- The insecurity of the digital signature algorithm with partially known nonces
- Attacking (EC)DSA given only an implicit hint
- GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias
Cited In (14)
- Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
- Speed optimizations in bitcoin key recovery attacks
- Generalized attack on ECDSA: known bits in arbitrary positions
- Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith
- White-box ECDSA: challenges and existing solutions
- The curious case of the half-half Bitcoin ECDSA nonces
- Attacking ECDSA leaking discrete bits with a more efficient lattice
- Isochronous Gaussian sampling: from inception to implementation
- GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias
- All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks
- Low error efficient computational extractors in the CRS model
- On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem
- Remote voting protocols. II
- Handle the traces: revisiting the attack on ECDSA with EHNP
This page was built for publication: Biased nonce sense: lattice attacks against weak ECDSA signatures in cryptocurrencies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2656908)