2012 Fourth International Conference on Intelligent Networking and Collaborative Systems 2012
DOI: 10.1109/incos.2012.41
|View full text |Cite
|
Sign up to set email alerts
|

Further Cryptanalysis of a Signature Scheme with Message Recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…They also suggest enhanced signature schemes, in which the digital signature is significantly reduced in length. Lei Niu et al, [30] describes a series of forgeries attacks in order to demonstrate the most effective method of obtaining the attacks. Jianhong Zhang et al, [31] deconstruct blind signatures and show that they are inherently insecure, before proposing a remedy.…”
Section: Non-physical Attacks and Security Requirementsmentioning
confidence: 99%
“…They also suggest enhanced signature schemes, in which the digital signature is significantly reduced in length. Lei Niu et al, [30] describes a series of forgeries attacks in order to demonstrate the most effective method of obtaining the attacks. Jianhong Zhang et al, [31] deconstruct blind signatures and show that they are inherently insecure, before proposing a remedy.…”
Section: Non-physical Attacks and Security Requirementsmentioning
confidence: 99%