Digital Signature Algorithm

Results: 127



#Item
101Electronic engineering / H.264/MPEG-4 AVC / Cryptographic hash function / Digital signature / Group of pictures / Motion JPEG / H.262/MPEG-2 Part 2 / Inter frame / Video compression / Cryptography / Video

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy K. R. Rao

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:17
102Key / Symmetric-key algorithm / Probabilistic encryption / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

RZ 3628 (# [removed]Computer Science 16 pages

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-29 07:25:33
103Digital signature / Key / Cryptographic hash function / Probabilistic encryption / Message authentication code / Symmetric-key algorithm / RSA / ID-based encryption / Signcryption / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
104Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
105Finite fields / BLS / Computational hardness assumptions / Digital signature / Full Domain Hash / Rabin signature algorithm / Diffie–Hellman key exchange / Diffie–Hellman problem / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic protocols

Short Signatures from the Weil Pairing∗ Dan Boneh† [removed]

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-09-08 17:10:53
106Cryptographic hash functions / Randomness / SHA-1 / FIPS 140-2 / Digital Signature Algorithm / Advanced Encryption Standard / Algorithm / Elliptic Curve DSA / Random number generation / Cryptography / Cryptography standards / Pseudorandom number generators

The Random Number Generator Validation System (RNGVS) January 31, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
107Post-quantum cryptography / Merkle signature scheme / Hashing / Digital signature / Cryptographic hash function / Digital Signature Algorithm / Elliptic Curve DSA / RSA / Hash function / Cryptography / Public-key cryptography / Key management

CMSS – An Improved Merkle Signature Scheme Johannes Buchmann1 , Luis Carlos Coronado Garc´ıa2 , Erik Dahmen1 , Martin D¨

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2006-10-23 05:39:57
108Key management / Cryptographic hash function / PKCS / Digital signature / Symmetric-key algorithm / Public key infrastructure / Block cipher / Microsoft CryptoAPI / Information security / Cryptography / Public-key cryptography / Message authentication codes

A Companion to User’s Guide to Cryptography and Standards Alexander W. Dent

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-03-20 11:00:00
109Digital Signature Algorithm / National Institute of Standards and Technology / American National Standards Institute / Random number generation / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Standards organizations / Pseudorandom number generators

NIST Opens Draft Special Publication 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, For Review and Comment, Supplemental ITL Bulletin for September 2013

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-09 21:57:13
110ElGamal signature scheme / XTR / Digital signature / KCDSA / Digital Signature Algorithm / RSA / Schnorr signature / GOST / Elliptic curve / Cryptography / Public-key cryptography / Finite fields

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:52
UPDATE