Results 21 to 30 of about 55,338 (230)

Efficient proxy ring signature for VANET

open access: yesThe Journal of Engineering, 2019
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu   +4 more
doaj   +1 more source

New DoS Defense Method Based on Strong Designated Verifier Signatures

open access: yesSensors, 2018
We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin.
Marcone Pereira de Almeida   +3 more
doaj   +1 more source

Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments

open access: yesAlgorithms, 2023
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals-
Marin Vidaković, Kruno Miličević
doaj   +1 more source

Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited

open access: yesIET Information Security, 2022
For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages ...
Huiwen Jia, Yupu Hu, Chunming Tang
doaj   +1 more source

A Multi-Signature Scheme for Defending Malleability Attack on DeFi

open access: yesIEEE Access
Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts.
Chen Zhang   +4 more
doaj   +1 more source

LESS is Even More: Optimizing Digital Signatures from Code Equivalence

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
LESS is a signature scheme based on the code equivalence problem that has advanced to the second round of the NIST PQC standardization process. While promising, the scheme suffers from relatively large signatures and moderate to slow signing and ...
Luke Beckwith   +4 more
doaj   +1 more source

Certificate Authority Capacity and Digital Signature Market Demand in Promoting Interoperability in Malaysia [PDF]

open access: yesITM Web of Conferences
The adoption of digital signatures is becoming increasingly popular among Malaysian users due to its many advantages, including increased security, convenience, and cost savings.
Azni A.H.   +5 more
doaj   +1 more source

MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture

open access: yesIEEE Access, 2021
Due to globalization and worldwide connectivity, multimedia data exchange has increased significantly over the Internet in the last decade. The life cycle of multimedia content is also getting more multifaceted as more people are accessing, sharing ...
Abdullah Ayub Khan   +4 more
doaj   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Improving the Performance of the Picnic Signature Scheme

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Picnic is a digital signature algorithm designed to provide security against attacks by quantum computers. The design uses only symmetric-key primitives, and is an efficient instantiation of the MPC-in-the-head paradigm.
Daniel Kales, Greg Zaverucha
doaj   +1 more source

Home - About - Disclaimer - Privacy