<--- Back to Details
First PageDocument Content
Digital signature / Data Encryption Standard / Federal Information Processing Standard / FIPS 140-2 / RSA / Non-repudiation / Cryptographic hash function / Elliptic Curve DSA / Cryptography standards / Cryptography / Public-key cryptography / Digital Signature Algorithm
Date: 2012-12-12 13:59:11
Digital signature
Data Encryption Standard
Federal Information Processing Standard
FIPS 140-2
RSA
Non-repudiation
Cryptographic hash function
Elliptic Curve DSA
Cryptography standards
Cryptography
Public-key cryptography
Digital Signature Algorithm

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 357,28 KB

Share Document on Facebook

Similar Documents

TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing for Disintermediation Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Čapkun Department of Computer Science ETH Zurich, Switzerla

DocID: 1vhEh - View Document

Key-collisions in (EC)DSA: Attacking Non-repudiation* Tomáš Rosa http://crypto.hyperlink.cz, email: Abstract. A new kind of attack on the non-repudiation property of digital signature schemes is present

DocID: 1tf5T - View Document

Non-repudiation analysis using LySa with annotations

DocID: 1t6sr - View Document

Notary / ENotary / Notary public / Act / Non-repudiation / Electronic signature / Will and testament

PDF Document

DocID: 1pHGu - View Document

(full paper) Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder Francis Klay1 and Laurent Vigneron2

DocID: 1lLJb - View Document