|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 142 occurrences of 78 keywords
|
|
|
Results
Found 321 publication records. Showing 321 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer |
Attacking ECDSA-Enabled RFID Devices. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Implementation Security, Radio-Frequency Identification, RFID, Elliptic Curve Cryptography, Side-Channel Analysis, ECDSA |
102 | Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt |
A Subliminal-Free Variant of ECDSA. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
subliminal communication, digital signature, ECDSA |
98 | Tanja Römer, Jean-Pierre Seifert |
Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
successive minimum, Cryptanalysis, side-channel-attacks, Lattice, ECDSA, Lattice basis reduction, LLL |
87 | Benjamin Arazi |
Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
access control, elliptic curve cryptography, smartcards, ECDSA |
83 | Monageng Kgwadi, Thomas Kunz |
Securing RDS broadcast messages for smart grid applications. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
BiBa, DR programs, HORSE, RDS, authentication, ECDSA |
80 | Xiaoyuan Yang 0002, Maotang Li, Lixian Wei, Yiliang Han |
New ECDSA-Verifiable Multi-receiver Generalization Signcryption. |
HPCC |
2008 |
DBLP DOI BibTeX RDF |
|
80 | Daniel R. L. Brown |
Generic Groups, Collision Resistance, and ECDSA. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
digital signatures, provable security, public key cryptography |
72 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC) |
68 | Bodo Möller, Andy Rupp |
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
embedded cryptography, elliptic curve cryptography, exponentiation, Efficient implementation, DSA, ECDSA |
68 | Murat Aydos, Tugrul Yanik, Çetin Kaya Koç |
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications |
65 | Marcel Medwed, Elisabeth Oswald |
Template Attacks on ECDSA. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
|
65 | Adrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone |
Accelerated Verification of ECDSA Signatures. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Serge Vaudenay |
Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
65 | John Malone-Lee, Nigel P. Smart |
Modifications of ECDSA. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
57 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
ECDL problem, GDH problem, signcryption, ECDSA |
53 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
50 | Serge Vaudenay |
The Security of DSA and ECDSA. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Don Johnson, Alfred Menezes, Scott A. Vanstone |
The Elliptic Curve Digital Signature Algorithm (ECDSA). |
Int. J. Inf. Sec. |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Sebastian Rohde, Thomas Eisenbarth 0001, Erik Dahmen, Johannes Buchmann 0001, Christof Paar |
Fast Hash-Based Signatures on Constrained Devices. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
hash based cryptography, Merkle signature scheme, digital signatures, Embedded security |
45 | Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu |
ECGSC: Elliptic Curve Based Generalized Signcryption. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart |
Flaws in Applying Proof Methodologies to Signature Schemes. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Lin You, Yixian Yang, Chun Qi Zhang |
Generalization of Elliptic Curve Digital Signature Schemes. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui |
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Chuanrong Zhang, Long Chi, Yuqing Zhang |
Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
generalized signcryption, security, efficiency, encryption, signature, ECDSA |
39 | Xiao-bao Yang 0001, Yuan Liu, Jun-Sheng Wu, Gang Han, Ya-Xue Liu, Xiao-Qiang Xi |
NOMOP-ECDSA: A Lightweight ECDSA Engine for Internet of Things. |
Wirel. Pers. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
39 | Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs |
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
39 | Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat |
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
39 | Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat |
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. |
IEEE Symposium on Security and Privacy |
2019 |
DBLP DOI BibTeX RDF |
|
39 | Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat |
Secure Two-party Threshold ECDSA from ECDSA Assumptions. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
39 | Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat |
Secure Two-party Threshold ECDSA from ECDSA Assumptions. |
IEEE Symposium on Security and Privacy |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto |
Verifier-Key-Flexible Universal Designated-Verifier Signatures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
universal designated-verifier signature, verifier-key-flexible, random oracle, ECDSA |
38 | Arnaud Boscher, Robert Naciri |
Optimal Use of Montgomery Multiplication on Smart Cards. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
GQ2, Smart Card, RSA, Montgomery Multiplication, ECDSA |
38 | Phong Q. Nguyen, Igor E. Shparlinski |
The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. |
Des. Codes Cryptogr. |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, distribution, lattices, elliptic curves, discrepancy, exponential sums, ECDSA, LLL, closest vector problem |
38 | Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller 0001, Timothy Draelos |
A Low-Power Design for an Elliptic Curve Digital Signature Chip. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Optimal El Gamal, Characteristic 2, Field Towers, Trinomial Basis, Qsolve, Almost-Inverse Algorithm, Point Halving, Signed Sliding Window, GF(289), GF(2178), Low Power, Digital Signature, VHDL, Hardware, Elliptic Curve, ECDSA, Quadratic Equation |
38 | Arash Reyhani-Masoleh, M. Anwarul Hasan |
Fast Normal Basis Multiplication Using General Purpose Processors. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
software algo- rithms, normal basis, ECDSA, Finite field multiplication, composite fields |
34 | Jin-Hee Han, Young-Jin Kim, Sung-Ik Jun, Kyo-Il Chung, Chang-Ho Seo |
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card. |
ICDCS Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Erik Dahmen, Christoph Krauß |
Short Hash-Based Signatures for Wireless Sensor Networks. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
hash-based signature scheme, Winternitz one-time signature scheme, wireless sensor network, hash chain |
30 | Jung Hee Cheon, Jeong Hyun Yi |
Fast Batch Verification of Multiple Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
sparse exponent, elliptic curve, exponentiation, Koblitz curve, Batch verification, non-adjacent form, Frobenius map |
30 | Franz Fürbass, Johannes Wolkerstorfer |
ECC Processor with Low Die Size for RFID Applications. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Stefan Tillich, Johann Großschädl |
A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices. |
ISCIS |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer |
A Low-Cost ECC Coprocessor for Smartcards. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
multiplicative inverse, digital signature, Elliptic Curve Cryptography (ECC), hardware implementation |
30 | André Weimerskirch, Christof Paar, Sheueling Chang Shantz |
Elliptic Curve Cryptography on a Palm OS Device. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
30 | David Naccache, Jacques Stern |
Signing on a Postcard. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
30 | Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara |
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Erik De Win, Serge Mister, Bart Preneel, Michael J. Wiener |
On the Performance of Signature Schemes Based on Elliptic Curves. |
ANTS |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Vimal Kumar 0001, Sanjay Madria |
Performance Analysis of Secure Hierarchical Data Aggregation in Wireless Sensor Networks. |
Mobile Data Management |
2010 |
DBLP DOI BibTeX RDF |
mica2, ECEG, security, aggregation, ECDSA |
22 | Arash Reyhani-Masoleh |
Efficient Algorithms and Architectures for Field Multiplication Using Gaussian Normal Bases. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
software algorithms, normal basis, ECDSA, Finite field multiplication, Gaussian normal basis |
22 | Arash Reyhani-Masoleh, M. Anwarul Hasan |
Fast Normal Basis Multiplication Using General Purpose Processors. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
software algorithms, normal basis, ECDSA, Finite field multiplication, composite fields |
19 | Xiang He, Weijiang Wang, Jingqi Zhang, Zhantao Zhang, Jianlei Yang, Hua Dang, Guiyu Wang |
A Universal Single and Double Point Multiplications Architecture for ECDSA Based on Differential Addition Chains. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan |
Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker. |
J. Supercomput. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Hongxin Zhang 0001, Guanghuan Xie, Xin Zou, Chi Zhang, Zhuo Li, Rui Qin 0002, Gang Xiong 0001, Fei-Yue Wang 0001 |
Asynchronous Threshold ECDSA With Batch Processing. |
IEEE Trans. Comput. Soc. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Kotaro Abe, Makoto Ikeda |
Template Attacks on ECDSA Hardware and Theoretical Estimation of the Success Rate. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Binbin Tu, Yu Chen 0003, Hongrui Cui, Xianfang Wang |
Fast two-party signature for upgrading ECDSA to two-party scenario easily. |
Theor. Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Xiao Yang, Chengru Zhang, Haiyang Xue, Man Ho Au |
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Mario Yaksetig |
Extremely Simple (Almost) Fail-Stop ECDSA Signatures. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
19 | Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai |
2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
19 | Yiming Gao, Jinghui Wang, Honggang Hu, Binang He |
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
19 | Binbin Tu, Min Zhang, Yu Chen |
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
19 | Handong Cui, Kwan Yin Chan, Tsz Hon Yuen, Xin Kang, Cheng-Kang Chu |
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Baohua Zhao, Xiao Zhang, Zhihao Wang, Shucai Wang, Fajiang Yu, Yaomin Jia |
Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary. |
Symmetry |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jinzheng Cao, Jian Weng 0001, Yanbin Pan, Qingfeng Cheng |
Generalized attack on ECDSA: known bits in arbitrary positions. |
Des. Codes Cryptogr. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Haoyuan Li, Hua Chen 0011, Xucang Han, Weiqiong Cao, Xiang Zhu, Huilong Jiang, Jian Wang |
Easily Overlooked Vulnerability in Implementation: Practical Fault Attack on ECDSA Round Counter. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Marco Macchetti |
A Novel Related Nonce Attack for ECDSA. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
19 | Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang |
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
19 | Dominik Hartmann, Eike Kiltz |
Limits in the Provable Security of ECDSA Signatures. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
19 | Guy Zyskind, Avishay Yanai, Alex 'Sandy' Pentland |
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
19 | Sermin Kocaman, Younes Talibi Alaoui |
Efficient Secure Two Party ECDSA. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
19 | Dylan Rowe, Joachim Breitner, Nadia Heninger |
The curious case of the half-half Bitcoin ECDSA nonces. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
19 | Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat |
Threshold ECDSA in Three Rounds. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
19 | Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang |
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. |
CCS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Lin Zhong, Yujue Wang, Jun Du, Daji Liang, Ziyuan Zhong, Kevin He, Andrew Zhang |
Fast 2-out-of-n ECDSA Threshold Signature. |
ISPA/BDCloud/SocialCom/SustainCom |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Dominik Hartmann, Eike Kiltz |
Limits in the Provable Security of ECDSA Signatures. |
TCC (4) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Joseph Clark, Farha Ali |
Analysis of ECDSA's Computational Impact on IoT Network Performance. |
ACM Southeast Regional Conference |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Habeeb Syed, Arinjita Paul, Meena Singh Dilip Singh, M. A. Rajan |
An Efficient Two-Party ECDSA Scheme for Cryptocurrencies. |
ICISS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow |
Real Threshold ECDSA. |
NDSS |
2023 |
DBLP BibTeX RDF |
|
19 | Christophe Giraud 0001, Agathe Houzelot |
Fault Attacks on a Cloud-Assisted ECDSA White-Box Based on the Residue Number System. |
FDTC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shunsuke Osaki, Noboru Kunihiro |
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. |
ICISC (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Sermin Kocaman, Younes Talibi Alaoui |
Efficient Secure Two Party ECDSA. |
IMACC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Alexandre Bouez, Kalpana Singh |
One Round Threshold ECDSA Without Roll Call. |
CT-RSA |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Dylan Rowe, Joachim Breitner, Nadia Heninger |
The Curious Case of the Half-Half Bitcoin ECDSA Nonces. |
AFRICACRYPT |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Abdelkrim Imghoure, Ahmed El-Yahyaoui, Fouzia Omary |
ECDSA-based certificateless conditional privacy-preserving authentication scheme in Vehicular Ad Hoc Network. |
Veh. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Binh Kieu-Do-Nguyen, Cuong Pham-Quoc, Ngoc-Thinh Tran, Cong-Kha Pham, Trong-Thuc Hoang |
Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA. |
Cryptogr. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Myungsun Kim, Sangrae Cho, Seongbong Choi, Young-Seob Cho, Soohyung Kim, Hyung Tae Lee |
A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sunghyun Jin, Sung Min Cho, HeeSeok Kim, Seokhie Hong |
Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method. |
IEEE Trans. Computers |
2022 |
DBLP DOI BibTeX RDF |
|
19 | J. Guruprakash, Srinivas Koppu |
An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in Blockchain and IoT. |
Informatica (Slovenia) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Zoya Dyka, Dan Kreiser, Ievgen Kabin, Peter Langendoerfer |
Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
19 | Xiao Yang, Mengling Liu, Man Ho Au, Xiapu Luo, Qingqing Ye 0001 |
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud 0001, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie |
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sven Bauer, Hermann Drexler, Max Gebhardt, Dominik Klein 0001, Friederike Laus, Johannes Mittmann |
Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud 0001, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie |
ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Thomas Pornin |
Truncated EdDSA/ECDSA Signatures. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Aayush Gupta, Kobi Gurkan |
An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Constantin Blokh, Nikolaos Makriyannis, Udi Peled |
Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui |
Efficient Online-friendly Two-Party ECDSA Signature. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Jens Groth, Victor Shoup |
Design and analysis of a distributed ECDSA signing service. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein 0001, Friederike Laus, Johannes Mittmann |
Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Yi Deng 0002, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie |
Promise Σ-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Hu Xiong, Chuanjie Jin, Mamoun Alazab, Kuo-Hui Yeh, Hanxiao Wang 0002, Thippa Reddy Gadekallu, Weizheng Wang, Chunhua Su |
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT. |
IEEE J. Biomed. Health Informatics |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergaard |
Fast threshold ECDSA with honest majority. |
J. Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yunjia Quan |
Expected Bitcoin Transaction Efficiency Under Dilithium and ECDSA. |
|
2022 |
DOI RDF |
|
Displaying result #1 - #100 of 321 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|