Results 21 to 30 of about 55,338 (230)
Efficient proxy ring signature for VANET
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu +4 more
doaj +1 more source
New DoS Defense Method Based on Strong Designated Verifier Signatures
We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin.
Marcone Pereira de Almeida +3 more
doaj +1 more source
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals-
Marin Vidaković, Kruno Miličević
doaj +1 more source
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages ...
Huiwen Jia, Yupu Hu, Chunming Tang
doaj +1 more source
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts.
Chen Zhang +4 more
doaj +1 more source
LESS is Even More: Optimizing Digital Signatures from Code Equivalence
LESS is a signature scheme based on the code equivalence problem that has advanced to the second round of the NIST PQC standardization process. While promising, the scheme suffers from relatively large signatures and moderate to slow signing and ...
Luke Beckwith +4 more
doaj +1 more source
Certificate Authority Capacity and Digital Signature Market Demand in Promoting Interoperability in Malaysia [PDF]
The adoption of digital signatures is becoming increasingly popular among Malaysian users due to its many advantages, including increased security, convenience, and cost savings.
Azni A.H. +5 more
doaj +1 more source
Due to globalization and worldwide connectivity, multimedia data exchange has increased significantly over the Internet in the last decade. The life cycle of multimedia content is also getting more multifaceted as more people are accessing, sharing ...
Abdullah Ayub Khan +4 more
doaj +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
Improving the Performance of the Picnic Signature Scheme
Picnic is a digital signature algorithm designed to provide security against attacks by quantum computers. The design uses only symmetric-key primitives, and is an efficient instantiation of the MPC-in-the-head paradigm.
Daniel Kales, Greg Zaverucha
doaj +1 more source

