Some lattice attacks on DSA and ECDSA
From MaRDI portal
Publication:429782
DOI10.1007/s00200-011-0154-4zbMath1266.94024OpenAlexW1971773630MaRDI QIDQ429782
Publication date: 20 June 2012
Published in: Applicable Algebra in Engineering, Communication and Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00200-011-0154-4
public key cryptographydiscrete logarithmDiophantine equationsdigital signature algorithmelliptic curve algorithm LLL
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16) Authentication, digital signatures and secret sharing (94A62)
Related Items (4)
A new enhancement of elliptic curve digital signature algorithm ⋮ (EC)DSA lattice attacks based on Coppersmith's method ⋮ New lattice attacks on DSA schemes ⋮ Применение теории решеток к анализу схем цифровой подписи
Cites Work
- A variant of digital signature algorithm
- Factoring polynomials with rational coefficients
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- The insecurity of the elliptic curve digital signature algorithm with partially known nonces
- On the security of the digital signature algorithm
- The insecurity of the digital signature algorithm with partially known nonces
- The state of elliptic curve cryptography
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A Survey of Public-Key Cryptosystems
- Lattice attacks on digital signature schemes
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Some lattice attacks on DSA and ECDSA