Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Generalized Key Substitution Attacks on Message Recovery Signatures

In: Tatra Mountains Mathematical Publications, vol. 70, no. 3
Atsushi Fujioka
Detaily:
Rok, strany: 2017, 119 - 138
Kľúčové slová:
message recovery signature, discrete logarithm, generalized key substitution attacks.
O článku:
The generalized key substitution attacks were proposed as a generalization of the key substitution attacks to examine the security of the signature schemes adopted in ISO/IEC (1st CD) 14888--3, which standardizes appendix-type signature schemes based on the discrete logarithm problem. This paper examines the message recovery signature schemes based on the discrete logarithm problem, adopted in ISO/IEC 9796--3:2006, and shows that all but one scheme are vulnerable to the generalized key substitution attacks.
Ako citovať:
ISO 690:
Fujioka, A. 2017. Generalized Key Substitution Attacks on Message Recovery Signatures. In Tatra Mountains Mathematical Publications, vol. 70, no.3, pp. 119-138. 1210-3195.

APA:
Fujioka, A. (2017). Generalized Key Substitution Attacks on Message Recovery Signatures. Tatra Mountains Mathematical Publications, 70(3), 119-138. 1210-3195.