Searched for: subject%3A%22logging%22
(1 - 1 of 1)
document
Zhao, Yi (author), Liang, K. (author), Zhao, Yanqi (author), Yang, Bo (author), Ming, Yang (author), Panaousis, Emmanouil (author)
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by subverting the original implementation. An ASA succeeds when it extracts secrets without being detected. To launch an ASA on signature schemes, existing studies often needed to collect signatures with successive indices to extract the signing key....
journal article 2022