Results 21 to 30 of about 473,703 (148)
New Blind Muti-signature Schemes based on ECDLP [PDF]
In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required. Blind signatures are considered the most important solutions to meeting these requirements.
Duc Nguyen Tan+4 more
core +3 more sources
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version) [PDF]
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the ...
Chevalier, Yannick, Kourjieh, Mounira
core +2 more sources
Model Digital Signature pada Dokumen Formal Akademik [PDF]
Digital signature system is implemented to improve the quality of document border services. A digital signature on a document means that the signatory knows and approves the document. On the other hand, previous research states that the digital signature
Henderi, H. (Henderi)+2 more
core
PERFORMANCE OF HYBRID SIGNATURES FOR PUBLIC KEY INFRASTRUCTURE CERTIFICATES [PDF]
The modern public key infrastructure (PKI) model relies on digital signature algorithms to provide message authentication, data integrity, and non-repudiation.
Lytle, John
core
A Digital Signature Scheme for Long-Term Security [PDF]
In this paper we propose a signature scheme based on two intractable problems, namely the integer factorization problem and the discrete logarithm problem for elliptic curves.
Poulakis, Dimitrios, Rolland, Robert
core +1 more source
Efficient and secure digital signature algorithm (DSA) [PDF]
The digital signature is used to ensure the integrity of messages as well as the authentication and non-repudiation of users. Today it has a very important role in information security. Digital signature is used in various fields such as e-commerce and e-
HAMADOUCHE, M\u27HAMED, Mehibel, Nissa
core +1 more source
Analysis of Digital Signature Rule in the Electronic Commerce Law of Indonesia\u27 [PDF]
The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill) in 2003, in which digital signature as a technology specific electronic (e) commerce has been promoted.
Irna Nurhayati
core +1 more source
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.+5 more
core +1 more source
Digital Signature :Best Practice Solution for the Distribution of Letters in College [PDF]
Purpose of implementation ofweb-based information systems that allow user stoaccess information anywhere and anytime. Especiallyin making letters out stillusea wet signature.
Asmawati, A. (Ari)+2 more
core
New Digital Signature Algorithm EHTv2 [PDF]
Every public-key encryption/decryption algorithm where the set of possible plain-texts is identical to the set of possible cipher-texts may be converted into a digital signature algorithm.
Semaev, Igor
core +1 more source