On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
Hiraku MoritaJacob C. N. SchuldtTakahiro MatsudaGoichiro HanaokaTetsu IwataPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2017)
Keyphrases
- malicious traffic
- anti virus
- signature verification
- computer security
- security mechanisms
- security threats
- security problems
- block cipher
- digital signature
- network traffic
- high security
- denial of service attacks
- java card
- security flaws
- network security
- smart card
- security breaches
- cyber attacks
- security requirements
- countermeasures
- security policies
- information security
- security vulnerabilities
- information leakage
- access control
- digital watermarking
- intrusion detection
- fault injection
- security issues
- cryptographic protocols
- encryption scheme
- security protocols