Lattice attacks on digital signature schemes
From MaRDI portal
Publication:5943686
DOI10.1023/A:1011214926272zbMath1006.94022MaRDI QIDQ5943686
Nigel P. Smart, N. A. Howgrave-Graham
Publication date: 4 November 2001
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Related Items (32)
Threshold Schnorr with stateless deterministic signing from standard assumptions ⋮ (EC)DSA lattice attacks based on Coppersmith's method ⋮ Evaluating the Cache Side Channel Attacks Against ECDSA ⋮ New lattice attacks on DSA schemes ⋮ A Tale of Three Signatures: Practical Attack of ECDSA with wNAF ⋮ Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm ⋮ Attacking (EC)DSA Given Only an Implicit Hint ⋮ Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation ⋮ Attacking ECDSA leaking discrete bits with a more efficient lattice ⋮ Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA ⋮ Integer LWE with non-subgaussian error and related attacks ⋮ Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator ⋮ Recovering secrets from prefix-dependent leakage ⋮ The hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applications ⋮ Analysis of hidden number problem with hidden multiplier ⋮ Handle the traces: revisiting the attack on ECDSA with EHNP ⋮ On the Security of Supersingular Isogeny Cryptosystems ⋮ Lattice attacks against elliptic-curve signatures with blinded scalar multiplication ⋮ Gradual sub-lattice reduction and a new complexity for factoring polynomials ⋮ The curious case of the half-half Bitcoin ECDSA nonces ⋮ Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions ⋮ Some lattice attacks on DSA and ECDSA ⋮ Limits of a conjecture on a leakage-resilient cryptosystem ⋮ Koblitz curve cryptosystems ⋮ Just a Little Bit More ⋮ Safe-Errors on SPA Protected Implementations with the Atomicity Technique ⋮ Predicting Lattice Reduction ⋮ A variant of digital signature algorithm ⋮ Применение теории решеток к анализу схем цифровой подписи ⋮ On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem ⋮ A probabilistic analysis on a lattice attack against DSA ⋮ Generic groups, collision resistance, and ECDSA
This page was built for publication: Lattice attacks on digital signature schemes