Attacking Deterministic Signature Schemes using Fault Attacks.
Damian PoddebniakJuraj SomorovskySebastian SchinzelManfred LochterPaul RöslerPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- signature scheme
- standard model
- chosen ciphertext
- threshold signature scheme
- chosen message
- public key
- digital signature scheme
- digital signature
- designated verifier
- group signature scheme
- secret key
- cryptographic protocols
- encryption scheme
- diffie hellman
- public key cryptosystem
- countermeasures
- blind signature scheme
- security analysis
- information security
- watermarking scheme
- blind signature
- ring signature
- forward secure
- data sharing