Handle the traces: revisiting the attack on ECDSA with EHNP
From MaRDI portal
Publication:6108775
DOI10.1007/978-3-031-22301-3_8zbMath1527.94026MaRDI QIDQ6108775
Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li
Publication date: 26 July 2023
Published in: Information Security and Privacy (Search for Journal in Brave)
Cites Work
- Unnamed Item
- The LLL algorithm. Survey and applications
- The insecurity of the elliptic curve digital signature algorithm with partially known nonces
- Shortest vector from lattice sieving: a few dimensions for free
- On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem
- LWE with side information: attacks and concrete security estimation
- The general sieve kernel and new records in lattice reduction
- Revisiting the expected cost of solving uSVP and applications to LWE
- Biased nonce sense: lattice attacks against weak ECDSA signatures in cryptocurrencies
- Just a Little Bit More
- Practical, Predictable Lattice Basis Reduction
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
- Lattice-based Cryptography
- A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
- Extended Hidden Number Problem and Its Cryptanalytic Applications
- Lattice attacks on digital signature schemes
This page was built for publication: Handle the traces: revisiting the attack on ECDSA with EHNP