The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase OK-ECDSA (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2002 (25) 2003-2005 (18) 2006-2007 (22) 2008 (15) 2009-2010 (17) 2011-2013 (17) 2014-2015 (17) 2016 (16) 2017-2018 (21) 2019 (30) 2020 (27) 2021 (31) 2022 (33) 2023 (21) 2024 (11)
Publication types (Num. hits)
article(133) data(2) incollection(1) inproceedings(185)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 142 occurrences of 78 keywords

Results
Found 321 publication records. Showing 321 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
117Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer Attacking ECDSA-Enabled RFID Devices. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Implementation Security, Radio-Frequency Identification, RFID, Elliptic Curve Cryptography, Side-Channel Analysis, ECDSA
102Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt A Subliminal-Free Variant of ECDSA. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF subliminal communication, digital signature, ECDSA
98Tanja Römer, Jean-Pierre Seifert Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF successive minimum, Cryptanalysis, side-channel-attacks, Lattice, ECDSA, Lattice basis reduction, LLL
87Benjamin Arazi Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, elliptic curve cryptography, smartcards, ECDSA
83Monageng Kgwadi, Thomas Kunz Securing RDS broadcast messages for smart grid applications. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF BiBa, DR programs, HORSE, RDS, authentication, ECDSA
80Xiaoyuan Yang 0002, Maotang Li, Lixian Wei, Yiliang Han New ECDSA-Verifiable Multi-receiver Generalization Signcryption. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
80Daniel R. L. Brown Generic Groups, Collision Resistance, and ECDSA. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF digital signatures, provable security, public key cryptography
72Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC)
68Bodo Möller, Andy Rupp Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF embedded cryptography, elliptic curve cryptography, exponentiation, Efficient implementation, DSA, ECDSA
68Murat Aydos, Tugrul Yanik, Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications
65Marcel Medwed, Elisabeth Oswald Template Attacks on ECDSA. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
65Adrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone Accelerated Verification of ECDSA Signatures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
65Serge Vaudenay Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
65John Malone-Lee, Nigel P. Smart Modifications of ECDSA. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
57Raylin Tso, Takeshi Okamoto, Eiji Okamoto ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ECDL problem, GDH problem, signcryption, ECDSA
53Christophe Giraud 0001, Erik Woodward Knudsen Fault Attacks on Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature
50Serge Vaudenay The Security of DSA and ECDSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Don Johnson, Alfred Menezes, Scott A. Vanstone The Elliptic Curve Digital Signature Algorithm (ECDSA). Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Sebastian Rohde, Thomas Eisenbarth 0001, Erik Dahmen, Johannes Buchmann 0001, Christof Paar Fast Hash-Based Signatures on Constrained Devices. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash based cryptography, Merkle signature scheme, digital signatures, Embedded security
45Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu ECGSC: Elliptic Curve Based Generalized Signcryption. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart Flaws in Applying Proof Methodologies to Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Lin You, Yixian Yang, Chun Qi Zhang Generalization of Elliptic Curve Digital Signature Schemes. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Chuanrong Zhang, Long Chi, Yuqing Zhang Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF generalized signcryption, security, efficiency, encryption, signature, ECDSA
39Xiao-bao Yang 0001, Yuan Liu, Jun-Sheng Wu, Gang Han, Ya-Xue Liu, Xiao-Qiang Xi NOMOP-ECDSA: A Lightweight ECDSA Engine for Internet of Things. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
39Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
39Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
39Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
39Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat Secure Two-party Threshold ECDSA from ECDSA Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
39Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat Secure Two-party Threshold ECDSA from ECDSA Assumptions. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto Verifier-Key-Flexible Universal Designated-Verifier Signatures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF universal designated-verifier signature, verifier-key-flexible, random oracle, ECDSA
38Arnaud Boscher, Robert Naciri Optimal Use of Montgomery Multiplication on Smart Cards. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF GQ2, Smart Card, RSA, Montgomery Multiplication, ECDSA
38Phong Q. Nguyen, Igor E. Shparlinski The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, distribution, lattices, elliptic curves, discrepancy, exponential sums, ECDSA, LLL, closest vector problem
38Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller 0001, Timothy Draelos A Low-Power Design for an Elliptic Curve Digital Signature Chip. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Optimal El Gamal, Characteristic 2, Field Towers, Trinomial Basis, Qsolve, Almost-Inverse Algorithm, Point Halving, Signed Sliding Window, GF(289), GF(2178), Low Power, Digital Signature, VHDL, Hardware, Elliptic Curve, ECDSA, Quadratic Equation
38Arash Reyhani-Masoleh, M. Anwarul Hasan Fast Normal Basis Multiplication Using General Purpose Processors. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF software algo- rithms, normal basis, ECDSA, Finite field multiplication, composite fields
34Jin-Hee Han, Young-Jin Kim, Sung-Ik Jun, Kyo-Il Chung, Chang-Ho Seo Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card. Search on Bibsonomy ICDCS Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Erik Dahmen, Christoph Krauß Short Hash-Based Signatures for Wireless Sensor Networks. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash-based signature scheme, Winternitz one-time signature scheme, wireless sensor network, hash chain
30Jung Hee Cheon, Jeong Hyun Yi Fast Batch Verification of Multiple Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sparse exponent, elliptic curve, exponentiation, Koblitz curve, Batch verification, non-adjacent form, Frobenius map
30Franz Fürbass, Johannes Wolkerstorfer ECC Processor with Low Die Size for RFID Applications. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Stefan Tillich, Johann Großschädl A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices. Search on Bibsonomy ISCIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer A Low-Cost ECC Coprocessor for Smartcards. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiplicative inverse, digital signature, Elliptic Curve Cryptography (ECC), hardware implementation
30André Weimerskirch, Christof Paar, Sheueling Chang Shantz Elliptic Curve Cryptography on a Palm OS Device. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30David Naccache, Jacques Stern Signing on a Postcard. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
30Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
30Erik De Win, Serge Mister, Bart Preneel, Michael J. Wiener On the Performance of Signature Schemes Based on Elliptic Curves. Search on Bibsonomy ANTS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
22Vimal Kumar 0001, Sanjay Madria Performance Analysis of Secure Hierarchical Data Aggregation in Wireless Sensor Networks. Search on Bibsonomy Mobile Data Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mica2, ECEG, security, aggregation, ECDSA
22Arash Reyhani-Masoleh Efficient Algorithms and Architectures for Field Multiplication Using Gaussian Normal Bases. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software algorithms, normal basis, ECDSA, Finite field multiplication, Gaussian normal basis
22Arash Reyhani-Masoleh, M. Anwarul Hasan Fast Normal Basis Multiplication Using General Purpose Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF software algorithms, normal basis, ECDSA, Finite field multiplication, composite fields
19Xiang He, Weijiang Wang, Jingqi Zhang, Zhantao Zhang, Jianlei Yang, Hua Dang, Guiyu Wang A Universal Single and Double Point Multiplications Architecture for ECDSA Based on Differential Addition Chains. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Hongxin Zhang 0001, Guanghuan Xie, Xin Zou, Chi Zhang, Zhuo Li, Rui Qin 0002, Gang Xiong 0001, Fei-Yue Wang 0001 Asynchronous Threshold ECDSA With Batch Processing. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Kotaro Abe, Makoto Ikeda Template Attacks on ECDSA Hardware and Theoretical Estimation of the Success Rate. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Binbin Tu, Yu Chen 0003, Hongrui Cui, Xianfang Wang Fast two-party signature for upgrading ECDSA to two-party scenario easily. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Xiao Yang, Chengru Zhang, Haiyang Xue, Man Ho Au Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Mario Yaksetig Extremely Simple (Almost) Fail-Stop ECDSA Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai 2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Yiming Gao, Jinghui Wang, Honggang Hu, Binang He Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Binbin Tu, Min Zhang, Yu Chen Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Handong Cui, Kwan Yin Chan, Tsz Hon Yuen, Xin Kang, Cheng-Kang Chu Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Baohua Zhao, Xiao Zhang, Zhihao Wang, Shucai Wang, Fajiang Yu, Yaomin Jia Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jinzheng Cao, Jian Weng 0001, Yanbin Pan, Qingfeng Cheng Generalized attack on ECDSA: known bits in arbitrary positions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Haoyuan Li, Hua Chen 0011, Xucang Han, Weiqiong Cao, Xiang Zhu, Huilong Jiang, Jian Wang Easily Overlooked Vulnerability in Implementation: Practical Fault Attack on ECDSA Round Counter. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Marco Macchetti A Novel Related Nonce Attack for ECDSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Dominik Hartmann, Eike Kiltz Limits in the Provable Security of ECDSA Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Guy Zyskind, Avishay Yanai, Alex 'Sandy' Pentland Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Sermin Kocaman, Younes Talibi Alaoui Efficient Secure Two Party ECDSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Dylan Rowe, Joachim Breitner, Nadia Heninger The curious case of the half-half Bitcoin ECDSA nonces. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat Threshold ECDSA in Three Rounds. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Lin Zhong, Yujue Wang, Jun Du, Daji Liang, Ziyuan Zhong, Kevin He, Andrew Zhang Fast 2-out-of-n ECDSA Threshold Signature. Search on Bibsonomy ISPA/BDCloud/SocialCom/SustainCom The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Dominik Hartmann, Eike Kiltz Limits in the Provable Security of ECDSA Signatures. Search on Bibsonomy TCC (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Joseph Clark, Farha Ali Analysis of ECDSA's Computational Impact on IoT Network Performance. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Habeeb Syed, Arinjita Paul, Meena Singh Dilip Singh, M. A. Rajan An Efficient Two-Party ECDSA Scheme for Cryptocurrencies. Search on Bibsonomy ICISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow Real Threshold ECDSA. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
19Christophe Giraud 0001, Agathe Houzelot Fault Attacks on a Cloud-Assisted ECDSA White-Box Based on the Residue Number System. Search on Bibsonomy FDTC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Shunsuke Osaki, Noboru Kunihiro Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. Search on Bibsonomy ICISC (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Sermin Kocaman, Younes Talibi Alaoui Efficient Secure Two Party ECDSA. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Alexandre Bouez, Kalpana Singh One Round Threshold ECDSA Without Roll Call. Search on Bibsonomy CT-RSA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Dylan Rowe, Joachim Breitner, Nadia Heninger The Curious Case of the Half-Half Bitcoin ECDSA Nonces. Search on Bibsonomy AFRICACRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Abdelkrim Imghoure, Ahmed El-Yahyaoui, Fouzia Omary ECDSA-based certificateless conditional privacy-preserving authentication scheme in Vehicular Ad Hoc Network. Search on Bibsonomy Veh. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Binh Kieu-Do-Nguyen, Cuong Pham-Quoc, Ngoc-Thinh Tran, Cong-Kha Pham, Trong-Thuc Hoang Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA. Search on Bibsonomy Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Myungsun Kim, Sangrae Cho, Seongbong Choi, Young-Seob Cho, Soohyung Kim, Hyung Tae Lee A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Sunghyun Jin, Sung Min Cho, HeeSeok Kim, Seokhie Hong Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19J. Guruprakash, Srinivas Koppu An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in Blockchain and IoT. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Zoya Dyka, Dan Kreiser, Ievgen Kabin, Peter Langendoerfer Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Xiao Yang, Mengling Liu, Man Ho Au, Xiapu Luo, Qingqing Ye 0001 Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud 0001, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Sven Bauer, Hermann Drexler, Max Gebhardt, Dominik Klein 0001, Friederike Laus, Johannes Mittmann Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud 0001, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Thomas Pornin Truncated EdDSA/ECDSA Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Aayush Gupta, Kobi Gurkan An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Constantin Blokh, Nikolaos Makriyannis, Udi Peled Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui Efficient Online-friendly Two-Party ECDSA Signature. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Jens Groth, Victor Shoup Design and analysis of a distributed ECDSA signing service. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein 0001, Friederike Laus, Johannes Mittmann Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Yi Deng 0002, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie Promise Σ-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Hu Xiong, Chuanjie Jin, Mamoun Alazab, Kuo-Hui Yeh, Hanxiao Wang 0002, Thippa Reddy Gadekallu, Weizheng Wang, Chunhua Su On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT. Search on Bibsonomy IEEE J. Biomed. Health Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergaard Fast threshold ECDSA with honest majority. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yunjia Quan Expected Bitcoin Transaction Efficiency Under Dilithium and ECDSA. Search on Bibsonomy 2022   DOI  RDF
Displaying result #1 - #100 of 321 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license