Publisher
Springer International Publishing
Reference21 articles.
1. Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: PODC 1989, pp. 201–209 (1989)
2. Bernstein, D.J., Lange, T., Niederhagen, R., Peters, C., Schwabe, P.: Implementing Wagner’s generalized birthday attack against the SHA-3 round-1 candidate FSB. Cryptology ePrint Archive, Report 2009/292 (2009). https://ia.cr/2009/292
3. Lecture Notes in Computer Science;D Boneh,2001
4. Brown, D.R.L.: Generic groups, collision resistance, and ECDSA. Des. Codes Crypt. 35, 119–152 (2002)
5. Canetti, R., Makriyannis, N., Peled, U.: UC non-interactive, proactive, threshold ECDSA. Cryptology ePrint Archive, Report 2020/492 (2020). https://ia.cr/2020/492
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Delegating FIDO Credentials Using Single-use ECDSA Signatures;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. Asynchronous Threshold ECDSA With Batch Processing;IEEE Transactions on Computational Social Systems;2024-02
3. SPRINT: High-Throughput Robust Distributed Schnorr Signatures;Lecture Notes in Computer Science;2024
4. Distributed Key Derivation for Multi-Party Management of Blockchain Digital Assets;2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS);2023-12-17
5. Limits in the Provable Security of ECDSA Signatures;Theory of Cryptography;2023