We discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the redundancy of public keys. Another weakness is found in the Alabbadi-Wicker scheme, which results in a universal forgery attack against it. This attack shows that the Alabbadi-Wicker scheme fails to implement the necessary property of a digital signature scheme: it is infeasible to find a false signature algorithm D from the public verification algorithm E such that E(D*(m)) = m for all messages m. Further analysis shows that this new weakness also applies to the Xinmei scheme
Digital signature schemes are ubiquitous in real-world applications of cryptography. They are the co...
In this paper we analyse the digital signature algorithm (DSA) and its immunity to the fault cryptan...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
In this paper we discuss the security of digital signature schemes based on error-- correcting codes...
In this paper we discuss the security of digital signature schemes based on error-- correcting codes...
In this paper we discuss the security of digital signature schemes based on error-- correcting codes...
. In this note, we show that the signature scheme based on error-correcting codes which has been pro...
Over the past years there have been few attempts to construct digital signature schemes based on the...
Over the past years there have been few attempts to construct digital signature schemes based on the...
International audienceKabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme ba...
International audienceKabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme ba...
Nyberg and Rueppel recently proposed a new EIGamal-type digital signature scheme with message recove...
A digital signature is a cryptographic primitive for ensuring the authenticity of digital documents....
[[abstract]]Due to the special requirements of the mobile code system, Shieh et al. (see IEEE Trans....
[[abstract]]Digital signature schemes with fault tolerance make it possible for error detections and...
Digital signature schemes are ubiquitous in real-world applications of cryptography. They are the co...
In this paper we analyse the digital signature algorithm (DSA) and its immunity to the fault cryptan...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
In this paper we discuss the security of digital signature schemes based on error-- correcting codes...
In this paper we discuss the security of digital signature schemes based on error-- correcting codes...
In this paper we discuss the security of digital signature schemes based on error-- correcting codes...
. In this note, we show that the signature scheme based on error-correcting codes which has been pro...
Over the past years there have been few attempts to construct digital signature schemes based on the...
Over the past years there have been few attempts to construct digital signature schemes based on the...
International audienceKabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme ba...
International audienceKabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme ba...
Nyberg and Rueppel recently proposed a new EIGamal-type digital signature scheme with message recove...
A digital signature is a cryptographic primitive for ensuring the authenticity of digital documents....
[[abstract]]Due to the special requirements of the mobile code system, Shieh et al. (see IEEE Trans....
[[abstract]]Digital signature schemes with fault tolerance make it possible for error detections and...
Digital signature schemes are ubiquitous in real-world applications of cryptography. They are the co...
In this paper we analyse the digital signature algorithm (DSA) and its immunity to the fault cryptan...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...