메뉴 건너뛰기




Volumn 30, Issue 2, 2003, Pages 201-217

The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces

Author keywords

Closest vector problem; Cryptanalysis; Discrepancy; Distribution; ECDSA; Elliptic curves; Exponential sums; Lattices; LLL

Indexed keywords

ALGORITHMS; POLYNOMIALS; VECTORS;

EID: 0141889703     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1025436905711     Document Type: Article
Times cited : (157)

References (31)
  • 2
    • 51249173801 scopus 로고
    • On Lovász lattice reduction and the nearest lattice point problem
    • L. Babai, On Lovász lattice reduction and the nearest lattice point problem, Combinatorica, Vol. 6 (1986) pp. 1-13.
    • (1986) Combinatorica , vol.6 , pp. 1-13
    • Babai, L.1
  • 3
    • 84958656559 scopus 로고    scopus 로고
    • "Pseudo-random" number generation within cryptographic algorithms: The DSS case
    • Proc. of Crypto '97. IACR, Springer-Verlag
    • M. Bellare, S. Goldwasser and D. Micciancio, "Pseudo-random" number generation within cryptographic algorithms: The DSS case, In Proc. of Crypto '97, volume 1294 of LNCS. IACR, Springer-Verlag (1997) pp. 277-291.
    • (1997) LNCS , vol.1294 , pp. 277-291
    • Bellare, M.1    Goldwasser, S.2    Micciancio, D.3
  • 4
    • 35048877979 scopus 로고    scopus 로고
    • On the generation of DSS one-time keys. Manuscript
    • March, February 2001
    • D. Bleichenbacher, On the generation of DSS one-time keys. Manuscript. The result was presented at the Monteverita workshop in March 2001, February 2001.
    • (2001) Monteverita Workshop
    • Bleichenbacher, D.1
  • 5
    • 84955621986 scopus 로고    scopus 로고
    • Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
    • Proc. of Crypto '96. IACR, Springer-Verlag
    • D. Boneh and R. Venkatesan, Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes, In Proc. of Crypto '96, volume 1109 of LNCS. IACR, Springer-Verlag (1996).
    • (1996) LNCS , vol.1109
    • Boneh, D.1    Venkatesan, R.2
  • 7
    • 0142002517 scopus 로고    scopus 로고
    • The exact security of ECDSA
    • Department of Combinatorics and Optimization, University of Waterloo CORR
    • D. R. L. Brown, The exact security of ECDSA. Technical report, Department of Combinatorics and Optimization, University of Waterloo (2000) CORR 2000-54.
    • (2000) Technical Report , pp. 2000-2054
    • Brown, D.R.L.1
  • 9
    • 84958967057 scopus 로고    scopus 로고
    • The insecurity of Nyberg-Rueppel and other DSA-like signature schemes with partially known nonce
    • Proc. Workshop on Cryptography and Lattices (CALC '01), Springer-Verlag
    • E. El Mahassni, P. Q. Nguyen and I. E. Shparlinski, The insecurity of Nyberg-Rueppel and other DSA-like signature schemes with partially known nonce, In Proc. Workshop on Cryptography and Lattices (CALC '01), volume 2146 of LNCS, Springer-Verlag (2001) pp. 97-109.
    • (2001) LNCS , vol.2146 , pp. 97-109
    • El Mahassni, E.1    Nguyen, P.Q.2    Shparlinski, I.E.3
  • 11
    • 0036003397 scopus 로고    scopus 로고
    • Security of the most significant bits of the Shamir message passing scheme
    • M. I. González Vasco and I. E. Shparlinski, Security of the most significant bits of the Shamir message passing scheme, Math. Comp., Vol. 71 (2002) pp. 333-342.
    • (2002) Math. Comp. , vol.71 , pp. 333-342
    • González Vasco, M.I.1    Shparlinski, I.E.2
  • 14
    • 84957705004 scopus 로고    scopus 로고
    • An elliptic curve implementation of the finite field digital signature algorithm
    • Proc. of Crypto '98, IACR, Springer-Verlag
    • N. Koblitz, An elliptic curve implementation of the finite field digital signature algorithm, In Proc. of Crypto '98, volume 1462 of LNCS, IACR, Springer-Verlag (1998) pp. 327-337.
    • (1998) LNCS , vol.1462 , pp. 327-337
    • Koblitz, N.1
  • 16
    • 84946822318 scopus 로고    scopus 로고
    • Exponential sums and group generators for elliptic curves over finite fields
    • Algorithmic Number Theory - Proc. of ANTS-IV, Springer-Verlag
    • D. Kohel and I. E. Shparlinski, Exponential sums and group generators for elliptic curves over finite fields, In Algorithmic Number Theory - Proc. of ANTS-IV, volume 1838 of LNCS, Springer-Verlag (2000) pp. 395-404.
    • (2000) LNCS , vol.1838 , pp. 395-404
    • Kohel, D.1    Shparlinski, I.E.2
  • 19
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A. K. Lenstra, H. W. Lenstra, Jr. and L. Lovász, Factoring polynomials with rational coefficients, Mathematische Ann., Vol. 261 (1982) pp. 513-534.
    • (1982) Mathematische Ann. , vol.261 , pp. 513-534
    • Lenstra, A.K.1    Lenstra H.W., Jr.2    Lovász, L.3
  • 21
    • 84968466879 scopus 로고
    • Exponential sums and Goppa codes
    • C. J. Moreno and O. Moreno, Exponential sums and Goppa codes, I. Proc. Amer. Math. Soc., Vol. 111 (1991) pp. 523-531.
    • (1991) I. Proc. Amer. Math. Soc. , vol.111 , pp. 523-531
    • Moreno, C.J.1    Moreno, O.2
  • 23
    • 0141898671 scopus 로고    scopus 로고
    • The dark side of the hidden number problem: Lattice attacks on DSA
    • K.-Y. Lam, I. E. Shparlinski, H. Wang and C. Xing, eds., Birkhäuser
    • P. Q. Nguyen, The dark side of the hidden number problem: Lattice attacks on DSA, In (K.-Y. Lam, I. E. Shparlinski, H. Wang and C. Xing, eds.), Proc. Workshop on Cryptography and Computational Number Theory (CCNT'99), Singapore, Birkhäuser (2001) pp. 321-330.
    • (2001) Proc. Workshop on Cryptography and Computational Number Theory (CCNT'99), Singapore , pp. 321-330
    • Nguyen, P.Q.1
  • 24
    • 33746391879 scopus 로고    scopus 로고
    • The insecurity of the Digital Signature Algorithm with partially known nonces
    • P. Q. Nguyen and I. E. Shparlinski, The insecurity of the Digital Signature Algorithm with partially known nonces, J. Cryptology, Vol. 15 (2002) pp. 151-176.
    • (2002) J. Cryptology , vol.15 , pp. 151-176
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 25
    • 33846870481 scopus 로고    scopus 로고
    • Lattice reduction in cryptology: An update
    • Algorithmic Number Theory - Proc. of ANTS-IV, Springer-Verlag
    • P. Q. Nguyen and J. Stern, Lattice reduction in cryptology: An update, In Algorithmic Number Theory - Proc. of ANTS-IV, volume 1838 of LNCS, Springer-Verlag (2000) pp. 85-112.
    • (2000) LNCS , vol.1838 , pp. 85-112
    • Nguyen, P.Q.1    Stern, J.2
  • 26
    • 33846867921 scopus 로고    scopus 로고
    • The two faces of lattices in cryptology
    • Proc. Workshop on Cryptography and Lattices (CALC '01), Springer-Verlag
    • P. Q. Nguyen and J. Stern, The two faces of lattices in cryptology, In Proc. Workshop on Cryptography and Lattices (CALC '01), volume 2146 of LNCS, Springer-Verlag (2001) pp. 146-180.
    • (2001) LNCS , vol.2146 , pp. 146-180
    • Nguyen, P.Q.1    Stern, J.2
  • 27
    • 0000997571 scopus 로고
    • Quasi-Monte Carlo methods and Pseudo-random numbers
    • H. Niederreiter, Quasi-Monte Carlo methods and Pseudo-random numbers, Bull. Amer. Math. Soc., Vol. 84 (1978) pp. 957-1041.
    • (1978) Bull. Amer. Math. Soc. , vol.84 , pp. 957-1041
    • Niederreiter, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.