Cited By
View all- Cheng JWang YChen RHuang X(2024)Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSAInformation Security and Privacy10.1007/978-981-97-5028-3_19(370-390)Online publication date: 15-Jul-2024
- Davis HGreen MHeninger NRyan KSuhl A(2024)On the Possibility of a Backdoor in the Micali-Schnorr GeneratorPublic-Key Cryptography – PKC 202410.1007/978-3-031-57718-5_12(352-386)Online publication date: 15-Apr-2024
- Wong HMa JYin HChow S(2023)How (Not) to Build Threshold EdDSAProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607230(123-134)Online publication date: 16-Oct-2023
- Show More Cited By