搜索结果: 1-12 共查到“军事学 dsa”相关记录12条 . 查询时间(0.156 秒)
On the One-Per-Message Unforgeability of (EC)DSA and its Variants
signature schemes DSA ECDSA
font style='font-size:12px;'>
2017/9/18
The American signature standards DSA and ECDSA, as well as their Russian and Chinese counterparts GOST 34.10 and SM2, are of utmost importance in the current security landscape. The mentioned schemes ...
"Make Sure DSA Signing Exponentiations Really are Constant-Time''
applied cryptography digital signatures side-channel analysis
font style='font-size:12px;'>
2016/6/8
TLS and SSH are two of the most commonly used protocols for securing Internet traffic. Many of the implementations of these protocols rely on the cryptographic primitives provided in the OpenSSL libra...
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
DSA ECDSA threshold signatures
font style='font-size:12px;'>
2016/1/27
While threshold signature schemes have been presented before,
there has never been an optimal threshold signature algorithm for
DSA. Due to the properties of DSA, it is far more difficult to create ...
New Lattice Attacks on DSA Schemes
DSA cryptanalysis lattice techniques
font style='font-size:12px;'>
2016/1/27
We prove that a system of linear congruences of a particular form
has at most a unique solution below a certain bound which can be
computed efficiently. Using this result we develop attacks against ...
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks
Related-key attacks Schnorr signatures DSA
font style='font-size:12px;'>
2015/12/21
In the ordinary security model for signature schemes, we consider an adversary that may
forge a signature on a new message using only his knowledge of other valid message and signature
pairs. To tak...
Small Solutions of Bivariant Modular Equations and the security of DSA and ECDSA
Public Key Cryptography Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm Algorithm LLL
font style='font-size:12px;'>
2009/8/7
In this paper, using the LLL reduction method and an algorithm for
the computation of the integral points of a class of conics, we find small
solutions of a class of bivariate modular equations of s...
Faster Multi-Exponentiation through Caching:Accelerating (EC)DSA Signature Verification
Efficient implementation elliptic curve cryptography ECDSA verification
font style='font-size:12px;'>
2009/6/2
Q We consider the task of computing power products
1ik gei
i (“multi-exponentiation”) where base elements g2, . . ., gk are
fixed while g1 is variable between multi-exponentiations but may repea...
Key-collisions in(EC)DSA: Attacking Non-repudiation
Key-collisions EC DSA Attacking Non-repudiation
font style='font-size:12px;'>
2009/4/15
A new kind of attack on the non-repudiation property of digital signature schemes is
presented. We introduce a notion of key-collisions, which may allow an attacker to claim that the
message (presen...
Experimenting with Faults, Lattices and the DSA
DSA fault injection glitch attacks
font style='font-size:12px;'>
2009/3/31
We present an attack on DSA smart-cards which combines
physical fault injection and lattice reduction techniques. This seems to be
the first (publicly reported) physical experiment allowing to concr...
On the Big Gap Between jpj and jqj in DSA
DSA Schnorr's signature message attack
font style='font-size:12px;'>
2008/5/30
We introduce a message attack against DSA and show that the security of
DSA is indeed reduced to the following problem, i.e., find µ 2 Zq such that
z = (^gµ mod p)mod q where Ordp(^g) = ...
Faster Multi-Exponentiation through Caching:Accelerating (EC)DSA Signature Verification
Efficient implementation elliptic curve cryptography ECDSA verification exponentiation DSA verification
font style='font-size:12px;'>
2008/5/20
We consider the task of computing power products Q1ik gei
i (“multi-exponentiation”) where base elements g2, . . ., gk are
fixed while g1 is variable between multi-exponentiations but may repeat,
...