An Intermediate Secret-Guessing Attack on Hash-Based Signatures.
Roland BoothYanhong XuSabyasachi KaratiReihaneh Safavi-NainiPublished in: IWSEC (2021)
Keyphrases
- secret key
- hash functions
- signature scheme
- public key
- digital signature
- smart card
- transitive closure
- countermeasures
- block cipher
- join algorithms
- key management
- signature verification
- malicious users
- signature recognition
- detection mechanism
- locality sensitive hashing
- binary codes
- hamming distance
- secret sharing scheme
- main memory
- expressive power
- secret data
- image reconstruction
- similarity search