Further Attacks on the Birational Permutation Signature Schemes

At Crypto 93, Shamir [3] proposed two signature schemes based on birational permutations. Coppersmith, Stern and Vaudenay [2] presented the first attacks on both cryptosystems. These attacks do not recover the secret key
At Crypto 93, Shamir [3] proposed two signature schemes based on birational permutations. Coppersmith, Stern and Vaudenay [2] presented the first attacks on both cryptosystems. These attacks do not recover the secret key. For one of the variants proposed by Shamir we show how to recover the secret key.
show moreshow less

Export metadata

  • Export Bibtex
  • Export RIS

Additional Services

    Share in Twitter Search Google Scholar
Metadaten
Author:Thorsten Theobald
URN:urn:nbn:de:hebis:30-12471
Document Type:Article
Language:English
Date of Publication (online):2005/07/19
Year of first Publication:1994
Publishing Institution:Univ.-Bibliothek Frankfurt am Main
Release Date:2005/07/19
Source:Advances in Cryptology - Crypto '94, Lecture Notes in Computer Science, Vol.839, Springer Verlag, pp. 136-147, 1994 , http://www.mi.informatik.uni-frankfurt.de/research/papers.html
Institutes:Mathematik
Informatik
Dewey Decimal Classification:510 Mathematik
Sammlungen:Universitätspublikationen
Licence (German):License Logo Veröffentlichungsvertrag für Publikationen

$Rev: 11761 $