Further attacks on the birational permutation signature schemes
- At Crypto 93, Shamir proposed two signature schemes based on birational permutations. Coppersmith, Stern and Vaudenay presented the first attacks on both cryptosystems. These attacks do not recover the secret key. For one of the variants proposed by Shamir we show how to recover the secret key.
Author: | Thorsten TheobaldORCiDGND |
---|---|
URN: | urn:nbn:de:hebis:30-12471 |
ISBN: | 3-540-58333-5 |
ISBN: | 0-387-58333-5 |
Publisher: | Springer |
Place of publication: | Berlin [u.a.] |
Document Type: | Article |
Language: | English |
Date of Publication (online): | 2005/07/19 |
Year of first Publication: | 1994 |
Publishing Institution: | Universitätsbibliothek Johann Christian Senckenberg |
Release Date: | 2005/07/19 |
Page Number: | 12 |
First Page: | 136 |
Last Page: | 147 |
Note: | Preprint 21 October 1994, später in: Advances in cryptology, 12, S. 136-147 |
Source: | Lecture notes in computer science, Vol. 839 |
HeBIS-PPN: | 358645506 |
Institutes: | Informatik und Mathematik / Mathematik |
Informatik und Mathematik / Informatik | |
Dewey Decimal Classification: | 5 Naturwissenschaften und Mathematik / 51 Mathematik / 510 Mathematik |
Licence (German): | Deutsches Urheberrecht |