Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2022.3191736
Abstract: Table-based scalar multiplication provides practical security for ECDSA signature generation. However, a novel key recovery attack against this form of ECDSA signature generation that exploits the collisions between entries was recently proposed at CHES 2021.…
read more here.
Keywords:
mml mml;
mml;
fixed base;
ecdsa ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Computational Social Systems"
DOI: 10.1109/tcss.2022.3230903
Abstract: Threshold Elliptic Curve Digital Signature Algorithm (ECDSA) has attracted a lot of attention due to the wide applications of ECDSA in crypto asset. Although several variants of threshold signature protocols can provide functions, such as…
read more here.
Keywords:
threshold ecdsa;
ecdsa;
ecdsa batch;
batch processing ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Symmetry"
DOI: 10.3390/sym15040913
Abstract: Lattice attacks can compromise the security of encryption algorithms used in blockchain networks, allowing attackers to tamper with transaction records, steal private keys, and execute other forms of attacks. With symmetric encryption, both parties can…
read more here.
Keywords:
lattice attacks;
ecdsa;
vector;
approach boundary ... See more keywords