Digital Signature Algorithm

Results: 127



#Item
21Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
22Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
23

PDF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:18:14
24Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism Pierre Lestringant* Frédéric Guihéry*

Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism Pierre Lestringant* Frédéric Guihéry*

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2015-05-07 04:40:10
25Advanced security prevents counterfeit products

Advanced security prevents counterfeit products

Add to Reading List

Source URL: www.insidesecure.com

Language: English
26Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:36:52
27FIPS PUB 186-2 (+Change Notice) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 2000 January 27

FIPS PUB 186-2 (+Change Notice) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 2000 January 27

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:57:16
28U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION

U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:54:51
29Guide to Mobile Internet Security  Guide to Mobile Internet Security Table of Contents 1. 1 Introduction..................................................................................................................

Guide to Mobile Internet Security Guide to Mobile Internet Security Table of Contents 1. 1 Introduction..................................................................................................................

Add to Reading List

Source URL: www.kannel.org

Language: English - Date: 2014-11-12 00:04:51
30Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1  Department of Computer Science

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43