International audienceDigital signature security is classically defined as an interaction between a signer , a verifier and an attacker A . A submits adaptively to a sequence of messages m 1,…,m q to which replies with the signatures U = {σ 1,…,σ q }. Given U, A attempts to produce a forgery, i.e. a pair (m′,σ′) such that and σ′∉U .The traditional approach consists in hardening against a large query bound q. Interestingly, this is one specific way to prevent A from winning the forgery game. This work explores an alternative option.Rather than hardening , we weaken A by preventing him from influencing ’s input: upon receiving m i , will generate a fresh ephemeral signature key-pair , use to sign m i , erase , and output the signature and a c...
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
Nyberg and Rueppel recently proposed a new EIGamal-type digital signature scheme with message recove...
International audienceDigital signature security is classically defined as an interaction between a ...
Abstract. The main difference between confirmer signatures and ordinary digital signatures is that a...
Abstract. The main difference between confirmer signatures and ordinary digital signatures is that a...
Abstract. We describe two new paradigms on how to obtain ordinary signatures that are secure against...
Digital signatures are often used by trusted authorities to make unique bindings between a subject a...
convertible undeniable signatures which limit the self-authenticating prop-erty of digital signature...
Recent work has shown that biometric key genera-tion using handwriting as input are susceptible to a...
International audienceRobustness is a notion often tacitly assumed while working with encrypted data...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptograp...
We introduce the notion of automorphic signatures, which satisfy the following properties: the verif...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
Nyberg and Rueppel recently proposed a new EIGamal-type digital signature scheme with message recove...
International audienceDigital signature security is classically defined as an interaction between a ...
Abstract. The main difference between confirmer signatures and ordinary digital signatures is that a...
Abstract. The main difference between confirmer signatures and ordinary digital signatures is that a...
Abstract. We describe two new paradigms on how to obtain ordinary signatures that are secure against...
Digital signatures are often used by trusted authorities to make unique bindings between a subject a...
convertible undeniable signatures which limit the self-authenticating prop-erty of digital signature...
Recent work has shown that biometric key genera-tion using handwriting as input are susceptible to a...
International audienceRobustness is a notion often tacitly assumed while working with encrypted data...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptograp...
We introduce the notion of automorphic signatures, which satisfy the following properties: the verif...
We present a digital signature scheme based on the computational difficulty of integer factorization...
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
Nyberg and Rueppel recently proposed a new EIGamal-type digital signature scheme with message recove...