<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Elliptic curve cryptography / Digital Signature Standard / Key management / Elliptic Curve Digital Signature Algorithm / Digital signature / Digital Signature Algorithm / EdDSA / Key / Domain Name System Security Extensions / Homomorphic encryption
Date: 2018-02-28 05:05:12
Cryptography
Public-key cryptography
Elliptic curve cryptography
Digital Signature Standard
Key management
Elliptic Curve Digital Signature Algorithm
Digital signature
Digital Signature Algorithm
EdDSA
Key
Domain Name System Security Extensions
Homomorphic encryption

Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 502,99 KB

Share Document on Facebook

Similar Documents

The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole

The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole

DocID: 1tx5k - View Document

ECC Summer School – Exercices Damien RobertCryptography  Implement public key encryption and signature with elliptic curves:

ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

DocID: 1r4ER - View Document

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

DocID: 1qPjA - View Document

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1  City College, City University of New York

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

DocID: 1qLzt - View Document

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

DocID: 1qHZI - View Document