全部 |
  • 全部
  • 题名
  • 关键词
  • NSTL主题词
  • 摘要
  • 会议名称
  • 论文-出处
  • 论文-作者
  • 论文-机构
  • 论文-DOI
  • 会议-出版者
  • 会议-出版地
  • 会议-主编
  • 会议-主办单位
  • 会议-举办地
  • ISSN
  • EISSN
  • ISBN
  • EISBN
检索 搜索会议录 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-Based Attacks NSTL国家科技图书文献中心

Yiming Gao |  Jinghui Wang... -  《Advances in Cryptology - ASIACRYPT 2024,Part VIII》 -  International Conference on the Theory and Application of Cryptology and Information Security - 2025, - 3~34 - 共32页

摘要: cryptographic schemes, such as ECDSA and Diffie-Hellman. There | -based attacks against ECDSA. We obtain several records | The Hidden Number Problem (HNP) has found |  extensive applications in side-channel attacks against |  are two primary algorithmic approaches to solving
关键词: ECDSA |  Hidden number problem |  Lattice sieving |  Lattice-based attacks

2. Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum NSTL国家科技图书文献中心

Xinxin Fan |  Teik Guan Tan... -  《Blockchain - ICBC 2024》 -  International Conference on Blockchain |  Services Conference Federation - 2025, - 3~15 - 共13页

摘要: Digital Signing Algorithm (ECDSA) are widely used in | Digital signatures based on Elliptic Curve |  Ethereum to secure transactions and Proof-of-Stake (PoS | ) consensus protocols. However, those digital signatures are |  vulnerable to quantum computing and therefore endanger the
关键词: Ethereum |  ECDSA |  Post-Quantum security |  Migration

3. Post-Quantum DNSSEC with Faster TCP Fallbacks NSTL国家科技图书文献中心

Aditya Singh Rawat |  Mahabir Prasad Jhanw... -  《Progress in Cryptology - INDOCRYPT 2024,Part II》 -  International Conference on Cryptology in India - 2025, - 212~236 - 共25页

摘要: currently deployed ECDSA P-256 and RSA-2048 setups in | In classical DNSSEC, a drop-in replacement |  with quantum-safe cryptography would increase DNS |  query resolution times by at least a factor of 2 | ×. Since a DNS response containing large post-quantum
关键词: Network security |  Post-quantum cryptography implementations |  DNSSEC

4. Efficient Secure Two Party ECDSA NSTL国家科技图书文献中心

Sermin Kocaman |  Younes Talibi Alaoui -  《Cryptography and Coding: 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings》 -  IMA International Conference on Cryptography and Coding - 2024, - 161~180 - 共20页

摘要: Signature Algorithm (ECDSA) has received increased |  literature to improve the efficiency of multiparty ECDSA | ) proposed a 2-party ECDSA protocol secure against |  efficient offline phase for a two-party ECDSA protocol | Distributing the Elliptic Curve Digital
关键词: ECDSA |  Two-party protocols |  Threshold signatures

5. Extremely Simple Fail-Stop ECDSA Signatures NSTL国家科技图书文献中心

Mario Yaksetig -  《Applied Cryptography and Network Security Workshops: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II》 -  International Conference on Applied Cryptography and Network Security - 2024, - 230~234 - 共5页

摘要: simple ECDSA fail-stop signature scheme. Our proposal |  traditional ECDSA, does not limit the number of signatures |  from a 'regular' ECDSA signature. | Fail-stop signatures are digital signatures |  that allow a signer to prove that a specific forged
关键词: Fail-stop signatures |  Formal methods analysis |  ECDSA

6. Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages NSTL国家科技图书文献中心

Shunsuke Osaki |  Noboru Kunihiro -  《Information Security and Cryptology: ICISC 2023: 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I》 -  International Conference on Information Security and Cryptology - 2024, - 163~184 - 共22页

摘要:It is well known that in ECDSA signatures, the | , we show by experiments that 131-bit ECDSA is |  secret key can be recovered if more than a certain |  number of tuples of random nonce partial information | , corresponding message hash values, and signatures are leaked
关键词: ECDSA |  Fourier analysis-based attack |  Side-channel attack

7. Comparison of ECDSA Signature Verification Implementations on Bare-Metal Embedded Systems NSTL国家科技图书文献中心

Philipp Holzer |  Franz Leopold Wiesin...... -  《36th European Modeling and Simulation Symposium》 -  International Multidisciplinary Modeling and Simulation Multiconference |  European Modeling and Simulation Symposium - 2024, - 37~43 - 共7页

摘要: (ECDSA) is a cryptographic scheme used to generate |  that perform an ECDSA signature verification. Those |  two implementations of the ECDSA signature |  by reason of the ECDSA and its requirement for | The elliptic curve digital signature algorithm
关键词: Cryptographics |  ECDSA |  RISC-V |  Coprocessor |  Performance evaluation

8. Threshold ECDSA in Three Rounds NSTL国家科技图书文献中心

Jack Doerner |  Yashvanth Kondi... -  《2024 IEEE Symposium on Security and Privacy: SP 2024, San Francisco, California, USA, 20-23 May 2024, [v.1]》 -  IEEE Symposium on Security and Privacy - 2024, - 3053~3071 - 共19页

摘要: threshold ECDSA signing with malicious security against a |  intermediate representation of ECDSA signatures that was | We present a three-round protocol for |  dishonest majority, which information-theoretically UC | -realizes a standard threshold signing functionality
关键词: Privacy |  Protocols |  Security |  Standards

9. Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA NSTL国家科技图书文献中心

Jialiu Cheng |  Yi Wang... -  《Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II》 -  Australasian Conference on Information Security and Privacy - 2024, - 370~390 - 共21页

摘要: apply it to Lindell's two-party ECDSA protocol (CRYPTO | The revelations of Edward Snowden in 2013 |  rekindled concerns within the cryptographic community |  regarding the potential subversion of cryptographic |  systems. Bellare et al. (CRYPTO'14) introduced the
关键词: Algorithm substitution attack |  Cryptographic protocol |  2-Party ECDSA

10. Securing Roadside Sensor Networks for Smart Driving Collaboration using ECDSA NSTL国家科技图书文献中心

Visvesvaran C |  Karthikeyan N K... -  《2024 5th International Conference on Electronics and Sustainable Communication Systems》 -  International Conference on Electronics and Sustainable Communication Systems - 2024, - 791~796 - 共6页

摘要: (ECDSA) ensures data validity and reliability | Smart transportation systems rely heavily on |  integrating Internet of Things (IoT) devices, especially |  roadside sensor networks, to significantly improve road |  safety, traffic control, and the overall quality of the
关键词: Heuristic algorithms |  Collaboration |  Vehicular ad hoc networks |  Routing |  Routing protocols |  Road safety |  Reliability |  Internet of Things |  Cryptography |  Vehicle dynamics
检索条件ECDSA
  • 检索词扩展

NSTL主题词

  • NSTL学科导航