Abstract
Two simple redundancy schemes are shown to be inadequate in securing RSA signatures against attacks based on multiplicative properties. The schemes generalize the requirement that each valid message starts or ends with a fixed number of zero bits. Even though only messages with proper redundancy are signed, forgers are able to construct signatures on messages of their choice.
Cite
CITATION STYLE
de Jonge, W., & Chaum, D. (1986). Attacks on Some RSA Signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 218 LNCS, pp. 18–27). Springer Verlag. https://doi.org/10.1007/3-540-39799-X_3
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.