Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks

    In the ordinary security model for signature schemes, we consider an adversary that may forge a signature on a new message using only his knowledge of other valid message and signature pairs. To take into acco...

    Hiraku Morita, Jacob C. N. Schuldt in Information Security and Cryptology - ICIS… (2016)

  2. Chapter and Conference Paper

    Attacks and Security Proofs of EAX-Prime

    \(\text {EAX}'\) (or EAX-prime) is an authenticated encryption (AE) specified by ANSI C12.22 as a ...

    Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata in Fast Software Encryption (2014)