Articles with "ecdsa" as a keyword



Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2022.3191736

Abstract: Table-based scalar multiplication provides practical security for ECDSA signature generation. However, a novel key recovery attack against this form of ECDSA signature generation that exploits the collisions between entries was recently proposed at CHES 2021.… read more here.

Keywords: mml mml; mml; fixed base; ecdsa ... See more keywords

Asynchronous Threshold ECDSA With Batch Processing

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Computational Social Systems"

DOI: 10.1109/tcss.2022.3230903

Abstract: Threshold Elliptic Curve Digital Signature Algorithm (ECDSA) has attracted a lot of attention due to the wide applications of ECDSA in crypto asset. Although several variants of threshold signature protocols can provide functions, such as… read more here.

Keywords: threshold ecdsa; ecdsa; ecdsa batch; batch processing ... See more keywords

Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary

Sign Up to like & get
recommendations!
Published in 2023 at "Symmetry"

DOI: 10.3390/sym15040913

Abstract: Lattice attacks can compromise the security of encryption algorithms used in blockchain networks, allowing attackers to tamper with transaction records, steal private keys, and execute other forms of attacks. With symmetric encryption, both parties can… read more here.

Keywords: lattice attacks; ecdsa; vector; approach boundary ... See more keywords