A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes.
Hermann SeuschekJohann HeyszlFabrizio De SantisPublished in: CS2@HiPEAC (2016)
Keyphrases
- signature scheme
- secret key
- standard model
- threshold signature scheme
- digital signature scheme
- public key
- digital signature
- public key cryptosystem
- group signature scheme
- designated verifier
- diffie hellman
- countermeasures
- provably secure
- key distribution
- blind signature
- data sets
- bilinear pairings
- power analysis
- authentication scheme
- ring signature
- proxy signature scheme
- access control
- low cost