2004
DOI: 10.1007/978-3-540-24691-6_24
|View full text |Cite
|
Sign up to set email alerts
|

A More Secure and Efficacious TTS Signature Scheme

Abstract: -derived SFLASH family of schemes, which uses monomials in a large field for the central portion, previously usually acknowledged as fastest. We show a small flaw in TTS/2 and present an improved TTS implementation which we call TTS/4. We will examine in some detail how well TTS/4 performs, how it stands up to previously known attacks, and why it represents an advance over TTS/2. Based on this topical assessment, we consider TTS in general and TTS/4 in particular to be competitive or superior in several aspect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
19
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 37 publications
1
19
0
Order By: Relevance
“…This concept was adapted and extended the concept [3] to include all polynomial maps without a low degree explicit inverse for which an inverse can be found without solving anything higher than linear equations. We will call term such maps tame, and ( [3]) TTS is defined as a multivariate DSS with a tame central map. For example, with n = 28, m = 20, φ 2 : [23].…”
Section: Triangular Maps Tame Maps and The Tts Familymentioning
confidence: 99%
See 3 more Smart Citations
“…This concept was adapted and extended the concept [3] to include all polynomial maps without a low degree explicit inverse for which an inverse can be found without solving anything higher than linear equations. We will call term such maps tame, and ( [3]) TTS is defined as a multivariate DSS with a tame central map. For example, with n = 28, m = 20, φ 2 : [23].…”
Section: Triangular Maps Tame Maps and The Tts Familymentioning
confidence: 99%
“…It only works if the central maps are rank-2 in some embedding field. Neither this nor any other specific attacks work against the tame-like systems that we will construct below (see [3]). …”
Section: Other Attacks and Security Criteria For A Multivariatementioning
confidence: 99%
See 2 more Smart Citations
“…We are interested in two candidates: RSA and ECDSA. Table 1 taken from [13] shows performance as tested on Pentium III 500 MHz, table 2 taken from [14] shows the results on StrongARM CPU 206 MHz. Table 3 shows our results tested on Pentium 4 (3 GHz) using the Microsoft cryptographic application programming interface (CryptoAPI) and the widely used Crypto++ library [15].…”
Section: Certificates Distributionmentioning
confidence: 99%