Results 21 to 30 of about 3,545,158 (344)
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting.
Hossein Pilaram +2 more
doaj +1 more source
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui +2 more
doaj +1 more source
Digital signature: advantages, challenges and strategies [PDF]
Digital signature solutions are rapidly replacing classic signatures and have the potential to dominate signature-related processes. The concept of a digital signature is based on the transition from paper to electronic documentation and the automation ...
ȚURCANU, Dinu +2 more
doaj +1 more source
Energy-Aware Digital Signatures for Embedded Medical Devices [PDF]
Authentication is vital for the Internet of Things (IoT)applications involving sensitive data (e.g., medical and financial systems). Digital signatures offer scalable authentication with non-repudiation and public verifiability, which are necessary for ...
Muslum Ozgur Ozmen, A. Yavuz, R. Behnia
semanticscholar +1 more source
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
R. Rivest, A. Shamir, L. Adleman
semanticscholar +1 more source
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source
Digital Signature Based on Quantum Key Exchange Algorithm [PDF]
Digital signatures are growing in importance as a legal standing with traditional handwritten signatures, most secure web transactions today are already dependent on digital signatures, which are included as part of the digital certificates a server ...
Samer Saeed Essa
doaj +1 more source
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts
Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries.
Riccardo Longo +4 more
doaj +1 more source
Continuous-variable quantum digital signatures over insecure channels [PDF]
Digital signatures ensure the integrity of a classical message and the authenticity of its sender. Despite their far-reaching use in modern communication, currently used signature schemes rely on computational assumptions and will be rendered insecure by
M. Thornton +3 more
semanticscholar +1 more source
An e-voting system for Android Smartphones
Electoral processes using electronic devices allow voters to cast electronically. Devices such as personal computers, Direct Record Machines (DRE) voting machines, and smartcards, among others, in conjunction with private nets or the Internet have been ...
Lourdes López García +3 more
doaj +1 more source

