Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks

    In the ordinary security model for signature schemes, we consider an adversary that may forge a signature on a new message using only his knowledge of other valid message and signature pairs. To take into acco...

    Hiraku Morita, Jacob C. N. Schuldt in Information Security and Cryptology - ICIS… (2016)