Practical attacks against the walnut digital signature scheme
From MaRDI portal
Publication:1633439
DOI10.1007/978-3-030-03326-2_2zbMath1446.94101OpenAlexW2806752113MaRDI QIDQ1633439
Simon R. Blackburn, Ward Beullens
Publication date: 20 December 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-03326-2_2
Related Items (2)
Attack on Kayawood protocol: uncloaking private keys ⋮ An attack on the Walnut digital signature algorithm
Cites Work
- Unnamed Item
- A proof of security of Yao's protocol for two-party computation
- More efficient universal circuit constructions
- Overlaying conditional circuit clauses for secure computation
- A reaction attack on a public key cryptosystem based on the word problem
- Valiant’s Universal Circuit is Practical
- FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR
- Two Halves Make a Whole
- Improved Garbled Circuit: Free XOR Gates and Applications
- A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
- Universal circuits (Preliminary Report)
- Software protection and simulation on oblivious RAMs
- How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Practical attacks against the walnut digital signature scheme