A chosen message attack on Demytko’s elliptic curve cryptosystem

被引:0
作者
Burton S. Kaliski
机构
[1] RSA Laboratories,
来源
Journal of Cryptology | 1997年 / 10卷
关键词
Elliptic curves; Chosen message attack; Demytko’s cryptosystem; Signature forgery;
D O I
暂无
中图分类号
学科分类号
摘要
One of the purported advantages of the elliptic curve cryptosystem proposed by Demytko in 1993 is resistance to signature forgery under a chosen message attack. Based on a similar result by Bleichenbacheret al. on the LUC cryptosystem, this purported advantage is shown not to hold.
引用
收藏
页码:71 / 72
页数:1
相关论文
共 22 条
  • [11] A refined power-analysis attack on elliptic curve cryptosystems
    Goubin, L
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 199 - 210
  • [12] Collision-Based Chosen-Message Simple Power Clustering Attack Algorithm
    Chen Aidong
    Xu Sen
    Chen Yun
    Qin Zhiguang
    CHINA COMMUNICATIONS, 2013, 10 (05) : 114 - 119
  • [13] A Low-Cost and High-Performance Cryptosystem Using Tripling-Oriented Elliptic Curve
    Alkhatib, Mohammad
    Aldalbahy, Wafa S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02) : 1807 - 1831
  • [14] A New Modified Cryptosystem Based on Menezes Vanstone Elliptic Curve Cryptography Algorithm that Uses Characters' Hexadecimal Values
    Kurt, Meltem
    Yerlikaya, Tarik
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 449 - 453
  • [15] An elliptic curve analogue of Pillai's lower bound on primitive roots
    Jin, Steven
    Washington, Lawrence C.
    CANADIAN MATHEMATICAL BULLETIN-BULLETIN CANADIEN DE MATHEMATIQUES, 2022, 65 (02): : 496 - 505
  • [16] Inferring sequences produced by elliptic curve generators using Coppersmith's methods
    Mefenza, Thierry
    Vergnaud, Damien
    THEORETICAL COMPUTER SCIENCE, 2020, 830 : 20 - 42
  • [17] Elliptic curve variants of the least quadratic nonresidue problem and Linnik's theorem
    Chen, Evan
    Park, Peter S.
    Swaminathan, Ashvin A.
    INTERNATIONAL JOURNAL OF NUMBER THEORY, 2018, 14 (01) : 255 - 288
  • [18] Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling
    Park, Dongjun
    Choi, Minsig
    Kim, Gyusang
    Bae, Daehyeon
    Kim, Heeseok
    Hong, Seokhie
    IEEE ACCESS, 2023, 11 : 44578 - 44589
  • [19] Orlov's equivalence and maximal Cohen-Macaulay modules over the cone of an elliptic curve
    Galinat, Lennart
    MATHEMATISCHE NACHRICHTEN, 2014, 287 (13) : 1438 - 1455