On the security of ECDSA with additive key derivation and presignatures.
Jens GrothVictor ShoupPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- high security
- network security
- private key
- elliptic curve
- data sets
- access control
- intrusion detection
- security policies
- secure communication
- neural network
- information assurance
- security management
- security problems
- digital signature
- security mechanisms
- security issues
- statistical databases
- computer security
- key management
- security systems
- security level
- encryption scheme
- public key
- security threats
- information security
- low cost