Practical algorithm substitution attack on extractable signatures |
| |
Authors: | Zhao Yi Liang Kaitai Zhao Yanqi Yang Bo Ming Yang Panaousis Emmanouil |
| |
Abstract: | Designs, Codes and Cryptography - An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by subverting the original implementation. An ASA succeeds when it... |
| |
Keywords: | |
本文献已被 SpringerLink 等数据库收录! |