NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Practical Attack on All Parameters of the DME Signature Scheme
Published
Author(s)
Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
Abstract
DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all the candidates. The public key is constructed from the alternation of very structured linear and non-linear components that constitute the private key, the latter being defined over an extension field. We exploit these structures by proposing an algebraic attack which is practical on all DME parameters.
Briaud, P.
, Bros, M.
, Perlner, R.
and Smith-Tone, D.
(2024),
Practical Attack on All Parameters of the DME Signature Scheme, Advances in Cryptology – EUROCRYPT 2024, Zurich, CH, [online], https://doi.org/10.1007/978-3-031-58754-2_1, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=957414
(Accessed October 1, 2025)