搜索结果: 1-12 共查到“军队指挥学 DSA”相关记录12条 . 查询时间(0.203 秒)
On the One-Per-Message Unforgeability of (EC)DSA and its Variants
signature schemes DSA ECDSA
2017/9/18
The American signature standards DSA and ECDSA, as well as their Russian and Chinese counterparts GOST 34.10 and SM2, are of utmost importance in the current security landscape. The mentioned schemes ...
"Make Sure DSA Signing Exponentiations Really are Constant-Time''
applied cryptography digital signatures side-channel analysis
2016/6/8
TLS and SSH are two of the most commonly used protocols for securing Internet traffic. Many of the implementations of these protocols rely on the cryptographic primitives provided in the OpenSSL libra...
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
DSA ECDSA threshold signatures
2016/1/27
While threshold signature schemes have been presented before,
there has never been an optimal threshold signature algorithm for
DSA. Due to the properties of DSA, it is far more difficult to create ...
We prove that a system of linear congruences of a particular form
has at most a unique solution below a certain bound which can be
computed efficiently. Using this result we develop attacks against ...
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks
Related-key attacks Schnorr signatures DSA
2015/12/21
In the ordinary security model for signature schemes, we consider an adversary that may
forge a signature on a new message using only his knowledge of other valid message and signature
pairs. To tak...
Small Solutions of Bivariant Modular Equations and the security of DSA and ECDSA
Public Key Cryptography Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm Algorithm LLL
2009/8/7
In this paper, using the LLL reduction method and an algorithm for
the computation of the integral points of a class of conics, we find small
solutions of a class of bivariate modular equations of s...
Faster Multi-Exponentiation through Caching:Accelerating (EC)DSA Signature Verification
Efficient implementation elliptic curve cryptography ECDSA verification
2009/6/2
Q We consider the task of computing power products
1ik gei
i (“multi-exponentiation”) where base elements g2, . . ., gk are
fixed while g1 is variable between multi-exponentiations but may repea...
Key-collisions in(EC)DSA: Attacking Non-repudiation
Key-collisions EC DSA Attacking Non-repudiation
2009/4/15
A new kind of attack on the non-repudiation property of digital signature schemes is
presented. We introduce a notion of key-collisions, which may allow an attacker to claim that the
message (presen...
We present an attack on DSA smart-cards which combines
physical fault injection and lattice reduction techniques. This seems to be
the first (publicly reported) physical experiment allowing to concr...
We introduce a message attack against DSA and show that the security of
DSA is indeed reduced to the following problem, i.e., find µ 2 Zq such that
z = (^gµ mod p)mod q where Ordp(^g) = ...
Faster Multi-Exponentiation through Caching:Accelerating (EC)DSA Signature Verification
Efficient implementation elliptic curve cryptography ECDSA verification exponentiation DSA verification
2008/5/20
We consider the task of computing power products Q1ik gei
i (“multi-exponentiation”) where base elements g2, . . ., gk are
fixed while g1 is variable between multi-exponentiations but may repeat,
...