Further attacks on the birational permutation signature schemes

At Crypto 93, Shamir proposed two signature schemes based on birational permutations. Coppersmith, Stern and Vaudenay  presented the first attacks on both cryptosystems. These attacks do not recover the secret key. For o
At Crypto 93, Shamir proposed two signature schemes based on birational permutations. Coppersmith, Stern and Vaudenay  presented the first attacks on both cryptosystems. These attacks do not recover the secret key. For one of the variants proposed by Shamir we show how to recover the secret key.
show moreshow less

Export metadata

  • Export Bibtex
  • Export RIS

Additional Services

    Share in Twitter Search Google Scholar
Metadaten
Author:Thorsten Theobald
URN:urn:nbn:de:hebis:30-12471
ISBN:3-540-58333-5
ISBN:0-387-58333-5
Parent Title (English):Advances in cryptology
Publisher:Springer
Place of publication:Berlin [u.a.]
Document Type:Article
Language:English
Date of Publication (online):2005/07/19
Year of first Publication:1994
Publishing Institution:Univ.-Bibliothek Frankfurt am Main
Release Date:2005/07/19
Pagenumber:12
First Page:136
Last Page:147
Source:Lecture notes in computer science, Vol. 839
HeBIS PPN:358645506
Institutes:Mathematik
Informatik
Dewey Decimal Classification:510 Mathematik
Sammlungen:Universitätspublikationen
Licence (German):License Logo Veröffentlichungsvertrag für Publikationen

$Rev: 11761 $