Results 11 to 20 of about 473,703 (148)

The Digital Signature Scheme MQQ-SIG [PDF]

open access: green, 2010
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given
Faugère, Jean-Charles   +6 more
core   +4 more sources

Quantum Digital Signature based on Quantum One-way Functions [PDF]

open access: green, 2004
A quantum digital signature protocol based on quantum mechanics is proposed in this paper. The security of the protocol relies on the existence of quantum one-way functions by quantum information theorem. This protocol involves a so-called arbitrator who
Feng, Deng-Guo, Lü, Xin
core   +6 more sources

The digital signature dilemma [PDF]

open access: yesannals of telecommunications - annales des télécommunications, 2006
The last ten years have seen an enormous amount of legal, regulatory, and technological activity aimed at designing a proper electronic equivalent to handwritten signatures. One such design, that of cryptology-based (or digital) signatures, has succeeded over other solutions to the point where, in certain legal systems, such as those of the Member ...
openaire   +3 more sources

Quantum signature scheme with single photons

open access: yes, 2005
Quantum digital signature combines quantum theory with classical digital signature. The main goal of this field is to take advantage of quantum effects to provide unconditionally secure signature.
A. Ekert   +12 more
core   +1 more source

Digital Signature Security in Data Communication

open access: yes, 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti   +8 more
core   +1 more source

Handwritten Signature Verification using Deep Learning [PDF]

open access: yes, 2020
Every person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions.
Abu-Naser, Samy S.   +6 more
core  

Uniform complexity and digital signatures [PDF]

open access: yesTheoretical Computer Science, 1981
AbstractA concept of uniform complexity is defined and a class of functions is shown to have uniform complexity. A special case of these results is used to develop a new digital signature method, which makes forging signatures as hard as factoring a large number and which allows half of the messages to be signed directly.
openaire   +3 more sources

Digital Signature menggunakan Elliptic curve digital signature algorithm(ECDSA) dan Rindael Algorithm untuk security pada MMS
(Elliptic Curce Digital Signature Algorithm (ECDSA) and Rijndael Algorithm Implementation for MMS Security)
[PDF]

open access: yes, 2010
ABSTRAKSI: MMS (Multimedia Messaging Service) adalah layanan komunikasi messaging yang telah ditetapkan standarnya oleh WAP dan 3GPP. Dalam MMS keamanan seakan menjadi suatu yang sangat penting seiring dengan perkembangan dalam hal teknologi ini.
Irvan Armando
core  

Digital signature [PDF]

open access: yes, 2008
Digitálního podpisu, které je námětem této semestrální práce, je v současnosti velmi aktuální. Se stále vzrůstajícími možnostmi internetu a vidinou snižující se četnosti používání papírové dokumentace bylo nutné vyvinout metodu podepisování ...
Vaverka, Aleš
core  

Cryptanalysis of a One-Time Code-Based Digital Signature Scheme

open access: yes, 2019
We consider a one-time digital signature scheme recently proposed by Persichetti and show that a successful key recovery attack can be mounted with limited complexity.
Baldi, Marco   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy