Filters








602 Hits in 5.6 sec

DSA Security Enhancement through Efficient Nonce Generation [article]

Akash Nag, Sunil Karforma
<span title="2015-08-26">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The Digital Signature Algorithm (DSA) has become the de facto standard for authentication of transacting entities since its inception as a standard by NIST.  ...  The standard algorithms for generation of the nonce as specified by NIST, as well as the widely implemented random number generators, fail to serve as true random sources, thus leaving the DSA algorithm  ...  Govt. published the Digital Signature Standard (DSS) under FIPS PUB 186-3 [2] , which proposed an algorithm, known as Digital Signature Algorithm (DSA), for generation and verification of digital signatures  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1508.06370v1">arXiv:1508.06370v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/345zvt3jqve7pgidzzjjgvym4e">fatcat:345zvt3jqve7pgidzzjjgvym4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200929093226/https://arxiv.org/ftp/arxiv/papers/1508/1508.06370.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6b/79/6b795ce595000f86b5d47787d3ba19c21ff6b002.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1508.06370v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Page 7266 of Mathematical Reviews Vol. , Issue 2003i [page]

<span title="">2003</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
(F-ENS-DI; Paris) ; Shparlinski, Igor E. (5-MCQR-CP; North Ryde) The insecurity of the digital signature algorithm with partially known nonces. (English summary) J.  ...  The digital signature algorithm (DSA) which is currently used as a federal standard is analyzed.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2003-09_2003i/page/7266" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2003-09_2003i/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

:{unav)

Phong Q. Nguyen, Igor E. Shparlinski
<span title="2012-12-28">2012</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c45m6ttnaje4xbjsq7m2c6df2a" style="color: black;">Designs, Codes and Cryptography</a> </i> &nbsp;
Nguyen and Shparlinski have recently presented a polynomial-time algorithm that provably recovers the signer's secret DSA key when a few consecutive bits of the random nonces k (used at each signature  ...  generation) are known for a number of DSA signatures at most linear in log q (q denoting as usual the small prime of DSA), under a reasonable assumption on the hash function used in DSA.  ...  Acknowledgment Work supported in part by the RNRT ''Turbo-signatures'' project of the French Ministry of Research and by ARC. IES supported in part by ARC.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1023/a:1025436905711">doi:10.1023/a:1025436905711</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3vhlnv2w3fethkaj3dqhbpohki">fatcat:3vhlnv2w3fethkaj3dqhbpohki</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830042907/http://ljk.imag.fr/membres/Jean-Guillaume.Dumas/Enseignements/ProjetsCrypto/FautesECC/Nguyen.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d2/ef/d2efc8d77de5b6fdb9c8dd4150bcd984dca5a607.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1023/a:1025436905711"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Page 3976 of Mathematical Reviews Vol. , Issue 2003e [page]

<span title="">2003</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
(F-ENS-DI; Paris) ; Shparlinski, Igor E. (5-MCQR-CP; North Ryde) The insecurity of Nyberg-Rueppel and other DSA-like signature schemes with partially known nonces.  ...  In the digital signature algorithm (DSA), a random nonce k € Fi is used to create a signature (r,s) on a message uw by computing r(k) =(g* mod p) mod q and s(k,u) =k~'(h(u) + ar(k)) mod q, where g is a  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2003-05_2003e/page/3976" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2003-05_2003e/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Page 6688 of Mathematical Reviews Vol. , Issue 2004h [page]

<span title="">2004</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
(F-ENS-DI; Paris) ; Shparlinski, Igor E. (5-MCQR-CP; North Ryde) The insecurity of the elliptic curve digital signature algorithm with partially known nonces. (English summary) Des.  ...  In a previous work, the authors concluded that a signer’s secret DSA key could be recovered with a polynomial-time algorithm when a few consecutive bits of the random nonce k are known for a number of  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2004-08_2004h/page/6688" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2004-08_2004h/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Constant-Time Callees with Variable-Time Callers

Cesar Pereida García, Billy Bob Brumley
<span title="">2017</span> <i > <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uxuxyt5v2zhk3lulgfi7oh4ny4" style="color: black;">USENIX Security Symposium</a> </i> &nbsp;
We propose a new approach of extracting a variable number of nonce bits from these sequences, and improve upon the best theoretical result to recover private keys in a lattice attack with as few as 50  ...  signatures and corresponding traces.  ...  The first author was supported in part by the Pekka Ahonen Fund through the Industrial Research Fund of Tampere University of Technology.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/uss/GarciaB17.html">dblp:conf/uss/GarciaB17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/smvcm2n64bcvvhludwt2uc7m5m">fatcat:smvcm2n64bcvvhludwt2uc7m5m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200728004924/https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-garcia.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/9a/bc9a1847a6b64ca6d3863d2e7b984a6f7c44834a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Lightweight and adaptable solution for security agility

<span title="2016-03-31">2016</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication.  ...  Secure communication is an important aspect of today's interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols.  ...  the error message, nonce and public key and a digital signature of the nonce and error message.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2016.03.015">doi:10.3837/tiis.2016.03.015</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6ik37k5btbhflpouvo64ks42v4">fatcat:6ik37k5btbhflpouvo64ks42v4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220227231118/http://itiis.org/digital-library/manuscript/file/21049/TIISVol10No3-15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/e2/05e28253db52c11800749f9d472c918ad77c94b8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2016.03.015"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Page 2978 of Mathematical Reviews Vol. , Issue 2002D [page]

<span title="">2002</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
digital signature scheme (116-129); Goichiro Hanaoka, Junji Shikata, Yuliang Zheng and Hideki Imai, Unconditionally secure digital signature schemes admitting transferability (130-142); Martin Hirt, Ueli  ...  ’ algorithm and saving approximately } of the time.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2002-04_2002d/page/2978" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2002-04_2002d/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Side-Channel Analysis of SM2

Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida Garcia, Billy Bob Brumley
<span title="">2018</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5i22f6noqzcuzalvmf6ckdmcmy" style="color: black;">Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC &#39;18</a> </i> &nbsp;
We carry out remote timings, cache timings, and EM analysis, with accompanying empirical data to demonstrate secret information leakage during execution of both digital signature generation and public  ...  SM2 is a public key cryptography suite originating from Chinese standards, including digital signatures and public key encryption.  ...  The third author was supported in part by a Nokia Foundation Scholarship and by the Pekka Ahonen Fund through the Industrial Research Fund of Tampere University of Technology.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3274694.3274725">doi:10.1145/3274694.3274725</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/acsac/TuveriHGB18.html">dblp:conf/acsac/TuveriHGB18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vztueekdx5ctjiqtfvcoyikcji">fatcat:vztueekdx5ctjiqtfvcoyikcji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218001055/https://eprint.iacr.org/2018/651.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/44/16/441664fcea7807ab65299c6cf3b63ca68040ece6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3274694.3274725"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

From A to Z: Projective coordinates leakage in the wild

Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
<span title="2020-06-19">2020</span> <i title="IACR Transactions on Cryptographic Hardware and Embedded Systems"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
It targets the insecure binary extended Euclidean algorithm implementation using a microarchitectural side-channel attack that allows recovering the projective representation of the output point of scalar  ...  multiplication during ECDSA signature generation.  ...  This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No 804476).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2020.i3.428-453">doi:10.13154/tches.v2020.i3.428-453</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tches/AldayaGB20.html">dblp:journals/tches/AldayaGB20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ooimjadaarbfngl454r2qzva2y">fatcat:ooimjadaarbfngl454r2qzva2y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200620053414/https://tches.iacr.org/index.php/TCHES/article/download/8596/8163" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/7d/f47d5de685665412a984ea7ecb0e7a1c3bcd4331.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2020.i3.428-453"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Review on the Impact of Quantum Computing on Blockchain Technology

Roman B. Shrestha
<span title="2021-10-31">2021</span> <i title="International Journal for Research in Applied Science and Engineering Technology (IJRASET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hsp44774azcezeyiq4kuzpfh5a" style="color: black;">International Journal for Research in Applied Science and Engineering Technology</a> </i> &nbsp;
Advanced quantum computing algorithms like Shor's and Grover's are at the heart of breaking many known asymmetric cyphers and pose a severe threat to blockchain systems.  ...  The use of mathematically complex algorithms and hashes secure a blockchain from the risk of potential attacks and forgery.  ...  , which in turn makes such cryptographic algorithms as ElGamal encryption, Diffie-Helman key exchange, the Digital Signature Algorithm, and elliptic curve cryptography insecure.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2021.38510">doi:10.22214/ijraset.2021.38510</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lmwewjshvbhtlemk3q5nkkrkvy">fatcat:lmwewjshvbhtlemk3q5nkkrkvy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211030062359/https://www.ijraset.com/best-journal/impact-of-quantum-computing-on-blockchain-technology" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/31/ae/31aedcceb843ec6c023a6dc671ce3bf80e390df8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2021.38510"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Proposed Workflow and Conceptual Implementation for Logistics Automation Using Block Chain Technology

Muhammad Jawad Hamid Mughal
<span title="2019-08-28">2019</span> <i title="Journal of Mechanics of Continua and Mathematical Sciences"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/km45ab6gnrbt5o7ulvumvzqf34" style="color: black;">JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES</a> </i> &nbsp;
Digital currency a well-known term in past few years that grabbed the attention all over specially in financial sectors. Bit coin is a modern name use for digital currency in today's world.  ...  In this paper, the concept of block chain technology has been incorporated to improve the logistics process using secure digital currency and automate the payment process using bit coins and eliminating  ...  In verification phase B will validate send data with A's public key. This method will insure the data is tampered or not [XII] . ECDSA is an algorithm used for digital signature in block chain.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26782/jmcms.2019.08.00033">doi:10.26782/jmcms.2019.08.00033</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4nwoaed2gzcmbir6q33znddj3a">fatcat:4nwoaed2gzcmbir6q33znddj3a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200507031850/http://www.journalimcms.org/wp-content/uploads/journal_download.php?postid=2693" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/70/90/7090742be14fa6bd116cec4b23b93d21227c2faf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26782/jmcms.2019.08.00033"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

"Make Sure DSA Signing Exponentiations Really are Constant-Time"

Cesar Pereida García, Billy Bob Brumley, Yuval Yarom
<span title="">2016</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS&#39;16</a> </i> &nbsp;
LibreSSL and BoringSSL) since roughly October 2005, which renders the implementation of the DSA signature scheme vulnerable to cache-based side-channel attacks.  ...  Many of the implementations of these protocols rely on the cryptographic primitives provided in the OpenSSL library.  ...  Acknowledgments The first author is supported by the Erasmus Mundus Nord-SecMob Master's Programme and the European Commission.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2976749.2978420">doi:10.1145/2976749.2978420</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/GarciaBY16.html">dblp:conf/ccs/GarciaBY16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/z4vavxoz7rel5grkwdvlrgkau4">fatcat:z4vavxoz7rel5grkwdvlrgkau4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210716120304/https://acris.aalto.fi/ws/portalfiles/portal/62350972/2976749.2978420.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6c/93/6c93f6c9305d77f2f53da7fc838870a134c64018.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2976749.2978420"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

On the Security o Lenstra' s Variant o DSA without Long Inversions [chapter]

Arjen K. Lenstra, Igor E. Shparlinski
<span title="">2001</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We use bounds of exponential sums to show that for a wide class of parameters the modification of the DSA signature scheme proposed by A. K.  ...  Lenstra at Asiacrypt'96 is as secure as the original scheme.  ...  Acknowledgement We thank Hugh Montgomery for indicating a proof of the bound (4).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44586-2_5">doi:10.1007/3-540-44586-2_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tnrbgxzsonfjfnpa77lutamcia">fatcat:tnrbgxzsonfjfnpa77lutamcia</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180729071648/https://link.springer.com/content/pdf/10.1007%2F3-540-44586-2_5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4a/e6/4ae63db0230959275d47b1be6a43ee5468b6e3b0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44586-2_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA

Alejandro Cabrera Aldaya, Billy Bob Brumley
<span title="2020-03-02">2020</span> <i title="IACR Transactions on Cryptographic Hardware and Embedded Systems"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
In this paper, we analyze the security of the mbedTLS binary GCD algorithm, an implementation that offers interesting challenges when compared for example with OpenSSL, due to the usage of very tight loops  ...  We analyze the security of some use cases of this algorithm in this library, resulting in the discovery of a new vulnerability in the ECDSA code path that allows a single-trace attack against this implementation  ...  This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No 804476).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2020.i2.196-221">doi:10.13154/tches.v2020.i2.196-221</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tches/AldayaB20.html">dblp:journals/tches/AldayaB20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v6rcxpomyvaftllx4rn3kzn5ny">fatcat:v6rcxpomyvaftllx4rn3kzn5ny</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307154255/https://tches.iacr.org/index.php/TCHES/article/download/8549/8114" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b2/a0/b2a07cf9d141c830d058babdabd4f4ebd56ad956.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2020.i2.196-221"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 602 results