@article{MVK_2018_9_4_a3,
author = {A. M. Guselev},
title = {Application of the lattice theory to the analysis of digital signature schemes},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {73--84},
year = {2018},
volume = {9},
number = {4},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MVK_2018_9_4_a3/}
}
A. M. Guselev. Application of the lattice theory to the analysis of digital signature schemes. Matematičeskie voprosy kriptografii, Tome 9 (2018) no. 4, pp. 73-84. http://geodesic.mathdoc.fr/item/MVK_2018_9_4_a3/
[1] Blake I. F., Garefalakis T., “On the security of the digital signature algorithm”, Des. Codes Cryptogr., 26:1–3 (2002), 87–96 | DOI | MR | Zbl
[2] Draziotis K., Poulakis D., “Lattice attacks on DSA schemes based on Lagrange's algorithm”, Lect. Notes Comput. Sci., 8080, 2013, 119–131 | DOI | MR | Zbl
[3] Faugere J.-L., Goyet C., Renault G., “Attacking (EC)DSA given only an implicit hint”, SAC 2012, Lect. Notes Comput. Sci., 7707, 2013, 252–274 | DOI | Zbl
[4] Horster P., Michels M., Petersen H., “Generalized El-Gamal signature schemes for one message block”, Proc. 2nd Int. Workshop on IT-Security (1994), 66–81
[5] Howgrave-Graham N. A., Smart N. P., “Lattice attacks on digital signature schemes”, Des. Codes Cryptogr., 23 (2001), 283–290 | DOI | MR | Zbl
[6] Lenstra A. K., Lenstra H. W. Jr., Lovasz L., “Factoring polynomials with rational coefficients”, Math. Ann., 261 (1982), 513–534 | DOI | MR
[7] Goldwasser S., Bellare M., Micciancio D., “'Pseudo-random' number generation within cryptographic algorithms: the DSS case”, Lect. Notes Comput. Sci., 1294, 1997, 277–291 | DOI | Zbl
[8] Micciancio D., Voulgaris P., “A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations”, SIAM J. Comput., 42:3 (2013), 1364–1391 | DOI | MR | Zbl
[9] Nguyen P., Shparlinski I. E., “The insecurity of the digital signature algorithm with partially known nonces”, J. Cryptology, 15 (2002), 151–176 | DOI | MR | Zbl
[10] Nguyen P., Shparlinski I. E., “The insecurity of the elliptic curve digital signature algorithm with partially known nonces”, Des. Codes Cryptogr., 30:2 (2003), 201–217 | DOI | MR | Zbl
[11] Digital signature standard, FIPS Publication 186, National Institute of Standards and Technology (NIST), May 1994
[12] Poulakis D., “Some lattice attacks on DSA and ECDSA”, Appl. Algebra Eng., Commun. and Comput., 22 (2011), 347–358 | DOI | MR | Zbl
[13] Poulakis D., “New lattice attacks on DSA schemes”, J. Math. Cryptology, 10:2 (2016), 135–144 | DOI | MR | Zbl
[14] Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Protsessy formirovaniya i proverki elektronnoi tsifrovoi podpisi, Natsionalnyi standart Rossiiskoi Federatsii. GOST R 34.10-2012, Federalnoe agentstvo po tekhnicheskomu regulirovaniyu i metrologii, M., 2012