Algebraic and quantum attacks on two digital signature schemes
DOI10.1515/JMC-2022-0023OpenAlexW4321380232MaRDI QIDQ2689205FDOQ2689205
Authors: Alexander Ushakov, Vladimir Shpilrain, Vitaliĭ Roman'kov
Publication date: 9 March 2023
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2022-0023
Recommendations
- Digital signature scheme with doubled verification equation
- scientific article; zbMATH DE number 7634958
- A practical digital signature scheme based on the hidden logarithm problem
- Digital signature scheme set in a hidden cyclic group
- Finite non-commutative associative algebras for setting the hidden discrete logarithm problem and post-quantum cryptoschemes on its base
algebraic cryptanalysisassociative algebradigital signaturepost-quantum cryptographynoncommutative algebrahidden subgroup problemquantum attack
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Cryptanalysis of a combinatorial public key cryptosystem
- Post-quantum signature algorithms based on the hidden discrete logarithm problem
- Cryptographic algorithms on groups and algebras
- Digital signature scheme with doubled verification equation
Cited In (10)
- Algebraic cryptanalysis of Yasuda, Takagi and Sakurai's signature scheme
- Non-commutative digital signatures
- Title not available (Why is that?)
- Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}
- Practical attacks against the walnut digital signature scheme
- Cryptanalysis of schemes based on pseudoinverse matrix
- Nonlinear noncommutative functions for data integrity
- On the impossibility of purely algebraic signatures
- Cryptanalysis of the birational permutation signature scheme over a non-commutative ring
- Title not available (Why is that?)
This page was built for publication: Algebraic and quantum attacks on two digital signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2689205)