First Page | Document Content | |
---|---|---|
![]() Date: 2012-12-12 13:59:11Digital signature Data Encryption Standard Federal Information Processing Standard FIPS 140-2 RSA Non-repudiation Cryptographic hash function Elliptic Curve DSA Cryptography standards Cryptography Public-key cryptography Digital Signature Algorithm | Source URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 357,28 KBShare Document on Facebook |
![]() | TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing for Disintermediation Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Čapkun Department of Computer Science ETH Zurich, SwitzerlaDocID: 1vhEh - View Document |
![]() | Key-collisions in (EC)DSA: Attacking Non-repudiation* Tomáš Rosa http://crypto.hyperlink.cz, email: Abstract. A new kind of attack on the non-repudiation property of digital signature schemes is presentDocID: 1tf5T - View Document |
![]() | Non-repudiation analysis using LySa with annotationsDocID: 1t6sr - View Document |
![]() | PDF DocumentDocID: 1pHGu - View Document |
![]() | (full paper) Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder Francis Klay1 and Laurent Vigneron2DocID: 1lLJb - View Document |