White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
White-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature...
Main Authors: | Jie Zhou, Jian Bai, Meng Shan Jiang |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/8881116 |
Similar Items
-
On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process
by: Josyula, Sai Prashanth
Published: (2015) -
Kleptographic Attacks on ECDSA
by: Nadezhda Anatolievna Chepick, et al.
Published: (2014-12-01) -
The Application of ECDSA on Ad-Hoc Networks
by: Yi-Yin Lai, et al.
Published: (2007) -
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
by: Jan Jancar, et al.
Published: (2020-08-01) -
Design and Implementation of An Elliptic Curve Cryptography Software based on PSEC-KEM and ECDSA
by: Wei-Tsung Chang, et al.
Published: (2006)