Results 21 to 30 of about 3,545,158 (344)

An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing

open access: yesIET Information Security, 2021
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting.
Hossein Pilaram   +2 more
doaj   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Digital signature: advantages, challenges and strategies [PDF]

open access: yesJournal of Social Sciences, 2020
Digital signature solutions are rapidly replacing classic signatures and have the potential to dominate signature-related processes. The concept of a digital signature is based on the transition from paper to electronic documentation and the automation ...
ȚURCANU, Dinu   +2 more
doaj   +1 more source

Energy-Aware Digital Signatures for Embedded Medical Devices [PDF]

open access: yesIEEE Conference on Communications and Network Security, 2019
Authentication is vital for the Internet of Things (IoT)applications involving sensitive data (e.g., medical and financial systems). Digital signatures offer scalable authentication with non-repudiation and public verifiability, which are necessary for ...
Muslum Ozgur Ozmen, A. Yavuz, R. Behnia
semanticscholar   +1 more source

A method for obtaining digital signatures and public-key cryptosystems

open access: yesCACM, 1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
R. Rivest, A. Shamir, L. Adleman
semanticscholar   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Digital Signature Based on Quantum Key Exchange Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2015
Digital signatures are growing in importance as a legal standing with traditional handwritten signatures, most secure web transactions today are already dependent on digital signatures, which are included as part of the digital certificates a server ...
Samer Saeed Essa
doaj   +1 more source

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts

open access: yesCryptography, 2022
Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries.
Riccardo Longo   +4 more
doaj   +1 more source

Continuous-variable quantum digital signatures over insecure channels [PDF]

open access: yesPhysical Review A, 2018
Digital signatures ensure the integrity of a classical message and the authenticity of its sender. Despite their far-reaching use in modern communication, currently used signature schemes rely on computational assumptions and will be rendered insecure by
M. Thornton   +3 more
semanticscholar   +1 more source

An e-voting system for Android Smartphones

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2014
Electoral processes using electronic devices allow voters to cast electronically. Devices such as personal computers, Direct Record Machines (DRE) voting machines, and smartcards, among others, in conjunction with private nets or the Internet have been ...
Lourdes López García   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy