Digital Signature Algorithm

Results: 127



#Item
31Cipher / Symmetric-key algorithm / Digital signature / Commitment scheme / Key generation / Key size / Key / RSA / Initialization vector / Cryptography / Key management / Public-key cryptography

Chapter 1 Introduction Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:40:23
32Cryptographic hash functions / Electronic commerce / Certificate policy / SHA-1 / SHA-2 / Digital signature / Public key certificate / Digital Signature Algorithm / SHA / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - APTFF_KTNET_2011_Jay Kim.ppt [호환 모드]

Add to Reading List

Source URL: unnext.unescap.org

Language: English
33IP / Undeniable signature / ElGamal signature scheme / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-02-10 16:32:44
34Post-quantum cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash tree / Hash function / Electronic signature / Public key infrastructure / Digital Signature Algorithm / Cryptography / Public-key cryptography / Key management

Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:37:18
35Peer-to-peer computing / Digital signature / Threshold cryptosystem / RSA / Elliptic Curve DSA / Paillier cryptosystem / XTR / Homomorphic encryption / Digital Signature Algorithm / Cryptography / Public-key cryptography / Bitcoin

Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed] Rosario Gennaro

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-08 09:13:05
36Digital signature / Rabin signature algorithm / RSA / Diffie–Hellman key exchange / ElGamal encryption / Schnorr signature / Euclidean algorithm / Naccache–Stern cryptosystem / ElGamal signature scheme / Cryptography / Public-key cryptography / XTR

Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-05-21 14:56:23
37RSA / Finite fields / Elliptic Curve DSA / Diffie–Hellman key exchange / Digital signature / Digital Signature Algorithm / SHA-1 / Subliminal channels / ElGamal signature scheme / Cryptography / Public-key cryptography / Electronic commerce

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
38Subliminal channels / Diffie–Hellman key exchange / Elliptic Curve DSA / Digital signature / Digital Signature Algorithm / One-time pad / ElGamal signature scheme / Random number generator attack / Cryptography / Public-key cryptography / RSA

Cryptographic Insecurity of the Test&Repeat Paradigm

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
39Field theory / Finite fields / Public-key cryptography / Group theory / Elliptic Curve DSA / Elliptic curve cryptography / Elliptic curve / ElGamal signature scheme / Discrete logarithm / Abstract algebra / Cryptography / Algebra

The Elliptic Curve Digital Signature Algorithm (ECDSA)    

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2009-10-15 20:03:40
40Cryptographic hash functions / CAdES / SHA-2 / PAdES / SHA-1 / Digital signature / XAdES / Digital Signature Algorithm / Elliptic Curve DSA / Cryptography / Cryptography standards / Public-key cryptography

TS[removed]V1[removed]Electronic Signatures and Infrastructures (ESI); Cryptographic Suites

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-11-04 03:37:55
UPDATE