Lattice attacks on digital signature schemes

From MaRDI portal
Publication:5943686

DOI10.1023/A:1011214926272zbMath1006.94022MaRDI QIDQ5943686

Nigel P. Smart, N. A. Howgrave-Graham

Publication date: 4 November 2001

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)




Related Items (32)

Threshold Schnorr with stateless deterministic signing from standard assumptions(EC)DSA lattice attacks based on Coppersmith's methodEvaluating the Cache Side Channel Attacks Against ECDSANew lattice attacks on DSA schemesA Tale of Three Signatures: Practical Attack of ECDSA with wNAFPartially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmAttacking (EC)DSA Given Only an Implicit HintHidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiationAttacking ECDSA leaking discrete bits with a more efficient latticeLattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSAInteger LWE with non-subgaussian error and related attacksSolving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generatorRecovering secrets from prefix-dependent leakageThe hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applicationsAnalysis of hidden number problem with hidden multiplierHandle the traces: revisiting the attack on ECDSA with EHNPOn the Security of Supersingular Isogeny CryptosystemsLattice attacks against elliptic-curve signatures with blinded scalar multiplicationGradual sub-lattice reduction and a new complexity for factoring polynomialsThe curious case of the half-half Bitcoin ECDSA noncesTwo-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functionsSome lattice attacks on DSA and ECDSALimits of a conjecture on a leakage-resilient cryptosystemKoblitz curve cryptosystemsJust a Little Bit MoreSafe-Errors on SPA Protected Implementations with the Atomicity TechniquePredicting Lattice ReductionA variant of digital signature algorithmПрименение теории решеток к анализу схем цифровой подписиOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemA probabilistic analysis on a lattice attack against DSAGeneric groups, collision resistance, and ECDSA




This page was built for publication: Lattice attacks on digital signature schemes