2019
DOI: 10.1007/978-3-030-21363-3_2
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing an Attack to DSA Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In this section we show how we can find the plaintext m(x) using the previous Proposition 2. 1. In this Proposition we provide only a sufficient condition.…”
Section: The Attack To Ntrumentioning
confidence: 98%
See 2 more Smart Citations
“…In this section we show how we can find the plaintext m(x) using the previous Proposition 2. 1. In this Proposition we provide only a sufficient condition.…”
Section: The Attack To Ntrumentioning
confidence: 98%
“…The answer to this question could be a part for a future work. What is more, the idea of bounding from below the length of every vector in a lattice, first applied in [1,2,27], where (EC)DSA was attacked using Babai's algorithm. The study of our attack to NTRU-prime lattices could also be a part of a future work.…”
Section: Conclusion -Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The advantage here is that we do not need the inequality ( 5), which we have assumed to be true. Inequality ( 9) can be checked easily for every N, q, and y, whereas our assumption ( 5) is hard to be checked for large values of N. The concept of using lower bounds for a shortest vector within a lattice and subsequently executing an attack on a system has previously found application in (EC)DSA, as demonstrated in [1,2].…”
mentioning
confidence: 99%