ecdsa
Papers (36)
# | Title | |
1. | Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Gennaro, Rosario and Goldfeder, Steven and Narayanan, Arvind. 2016. | |
2. | Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Giulio Malavolta and Pedro Moreno-Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei. 2019. | |
3. | Fast multiparty threshold ecdsa with fast trustless setup Gennaro, Rosario and Goldfeder, Steven. 2018. | |
4. | Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA) Pornin, Thomas. 2013. | |
5. | Fast secure two-party ECDSA signing Lindell, Yehuda. 2017. | |
6. | Fast secure multiparty ecdsa with practical distributed key generation and applications to cryptocurrency custody Lindell, Yehuda and Nof, Ariel. 2018. | |
7. | Secure two-party threshold ECDSA from ECDSA assumptions Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2018. | |
8. | Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi. 2019. | |
9. | Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019. | |
10. | UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts Canetti, Ran and Gennaro, Rosario and Goldfeder, Steven and Makriyannis, Nikolaos and Peled, Udi. 2020. | |
11. | LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom. 2020. | |
12. | Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Goldfeder, Steven and Gennaro, Rosario and Kalodner, Harry and Bonneau, Joseph and Kroll, Joshua A and Felten, Edward W and Narayanan, Arvind. 2015. | |
13. | Two-party ECDSA from hash proof systems and efficient instantiations Castagnos, Guilhem and Catalano, Dario and Laguillaumie, Fabien and Savasta, Federico and Tucker, Ida. 2019. | |
14. | Bandwidth-efficient threshold EC-DSA Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker. 2020. | |
15. | One Round Threshold ECDSA with Identifiable Abort Rosario Gennaro and Steven Goldfeder. 2020. | |
16. | Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven. 2017. | |
17. | Fast Threshold ECDSA with Honest Majority Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård. 2020. | |
18. | Minerva: The curse of ECDSA nonces Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys. 2020. | |
19. | A Formal Treatment of Deterministic Wallets Das, Poulami and Faust, Sebastian and Loss, Julian. 2019. | |
20. | Verifiable Timed Signatures Made Practical Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and D\"ottling, Nico and Kate, Aniket and Schr\"oder, Dominique. 2020. | |
21. | UC Non-Interactive, Proactive, Threshold ECDSA Ran Canetti and Nikolaos Makriyannis and Udi Peled. 2020. | |
22. | Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices Yashvanth Kondi and Bernardo Magri and Claudio Orlandi and Omer Shlomovits. 2019. | |
23. | Threshold ECDSA for Decentralized Asset Custody Adam Gągol and Damian Straszak. 2020. | |
24. | A Survey of ECDSA Threshold Signing Jean-Philippe Aumasson and Adrian Hamelink and Omer Shlomovits. 2020. | |
25. | Thresholdizing HashEdDSA: MPC to the rescue Bonte, Charlotte and Smart, Nigel P and Tanguy, Titouan. 2021. | |
26. | An airdrop that preserves recipient privacy⋆ Wahby, Riad S and Boneh, Dan and Jeffrey, Christopher and Poon, Joseph. 2020. | |
27. | A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli and Rémi Piau and Cécile Pierrot. 2019. | |
28. | On the security of ECDSA with additive key derivation and presignatures Jens Groth and Victor Shoup. 2021. | |
29. | Threshold ECDSA with an Offline Recovery Party Battagliola, Michele and Longo, Riccardo and Meneghetti, Alessio and Sala, Massimiliano. 2020. | |
30. | ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Shlomovits, Omer and Seres, Istv\'an Andr\'as. 2019. | |
31. | Attacking (EC)DSA With Partially Known Multiples of Nonces Marios Adamoudis and Konstantinos A. Draziotis and Dimitrios Poulakis. 2021. | |
32. | Off-chain protocols for cryptocurrencies Goldfeder, Steven Andrew and others. 2018. | |
33. | Absentia: secure function evaluation on Ethereum Demirag, Didem and Clark, Jeremy. 2021. | |
34. | Limits in the Provable Security of ECDSA Signatures Dominik Hartmann and Eike Kiltz. 2023. | |
35. | The curious case of the half-half Bitcoin ECDSA nonces Dylan Rowe and Joachim Breitner and Nadia Heninger. 2023. | |
36. | Practical Key-Extraction Attacks in Leading MPC Wallets Nikolaos Makriyannis and Oren Yomtov. 2023. |
Videos
–
Links
–