Sciweavers

248 search results - page 16 / 50
» Fault Attacks on Signature Schemes
Sort
View
EUROCRYPT
2007
Springer
14 years 2 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek
ASIACRYPT
2005
Springer
14 years 2 months ago
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
Abstract We provide evidence that the unforgeability of several discrete-log based signatures like Schnorr signatures cannot be equivalent to the discrete log problem in the standa...
Pascal Paillier, Damien Vergnaud
ACISP
2004
Springer
14 years 1 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
14 years 6 days ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
CARDIS
2008
Springer
106views Hardware» more  CARDIS 2008»
13 years 10 months ago
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices
Abstract. In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization o...
Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Pr...