Results 41 to 50 of about 3,545,158 (344)

Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited

open access: yesIET Information Security, 2022
For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages ...
Huiwen Jia, Yupu Hu, Chunming Tang
doaj   +1 more source

Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments

open access: yesAlgorithms, 2023
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals-
Marin Vidaković, Kruno Miličević
doaj   +1 more source

Digital Signature Security in Data Communication

open access: yes, 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti   +8 more
core   +1 more source

Experimental transmission of quantum digital signatures over 90  km of installed optical fiber using a differential phase shift quantum key distribution system. [PDF]

open access: yesOptics Letters, 2016
Quantum digital signatures (QDSs) apply quantum mechanics to the problem of guaranteeing message integrity and non-repudiation with information-theoretical security, which are complementary to the confidentiality realized by quantum key distribution (QKD)
R. Collins   +9 more
semanticscholar   +1 more source

A Multi-Signature Scheme for Defending Malleability Attack on DeFi

open access: yesIEEE Access
Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts.
Chen Zhang   +4 more
doaj   +1 more source

DEC‐LADE: Dual elliptic curve‐based lightweight authentication and data encryption scheme for resource constrained smart devices

open access: yesIET Wireless Sensor Systems, 2021
The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐devices communicating over the Internet. As these resource‐constrained devices are connected over the Internet, they are exposed to various security and privacy ...
Vidya Rao, Prema K. V.
doaj   +1 more source

Non-Repudiation in Internet Telephony

open access: yes, 2007
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication.
Hett, Christian   +2 more
core   +1 more source

Fiddling With the ECT Act – Electronic Signatures [PDF]

open access: yesPotchefstroom Electronic Law Journal, 2014
Amongst the changes the Department of Trade and Industry is considering is an amendment of the definition of "electronic signature". Although the amendment seems to be in line with the provisions of the UNCITRAL Model Laws on eCommerce and the 2005 UN ...
Sieg Eiselen
doaj   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

LESS is Even More: Optimizing Digital Signatures from Code Equivalence

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
LESS is a signature scheme based on the code equivalence problem that has advanced to the second round of the NIST PQC standardization process. While promising, the scheme suffers from relatively large signatures and moderate to slow signing and ...
Luke Beckwith   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy