Further attacks on the birational permutation signature schemes

  • At Crypto 93, Shamir proposed two signature schemes based on birational permutations. Coppersmith, Stern and Vaudenay presented the first attacks on both cryptosystems. These attacks do not recover the secret key. For one of the variants proposed by Shamir we show how to recover the secret key.

Download full text files

Export metadata

Additional Services

Share in Twitter Search Google Scholar
Metadaten
Author:Thorsten TheobaldORCiDGND
URN:urn:nbn:de:hebis:30-12471
ISBN:3-540-58333-5
ISBN:0-387-58333-5
Publisher:Springer
Place of publication:Berlin [u.a.]
Document Type:Article
Language:English
Date of Publication (online):2005/07/19
Year of first Publication:1994
Publishing Institution:Universit├Ątsbibliothek Johann Christian Senckenberg
Release Date:2005/07/19
Page Number:12
First Page:136
Last Page:147
Note:
Preprint 21 October 1994, sp├Ąter in: Advances in cryptology, 12, S. 136-147
Source:Lecture notes in computer science, Vol. 839
HeBIS-PPN:358645506
Institutes:Informatik und Mathematik / Mathematik
Informatik und Mathematik / Informatik
Dewey Decimal Classification:5 Naturwissenschaften und Mathematik / 51 Mathematik / 510 Mathematik
Licence (German):License LogoDeutsches Urheberrecht