Digital Signature Algorithm

Results: 127



#Item
41Applied mathematics / RSA / Security / Digital signature / Rabin signature algorithm / ElGamal signature scheme / Public-key cryptography / Cryptography / Cyberwarfare

PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2014-12-02 03:11:30
42Cyberwarfare / Mathematics / Applied mathematics / RSA / Prime number / Digital signature / Rabin signature algorithm / Public-key cryptography / Cryptography / Electronic commerce

Index Calculation Attacks on RSA Signature and Encryption Jean-S´ebastien Coron1 , Yvo Desmedt2 , David Naccache1 , Andrew Odlyzko3 , and Julien P. Stern4 1 Gemplus Card International

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2015-04-03 04:14:18
43Key management / Electronic commerce / Elliptic curve cryptography / IEEE P1363 / Strong prime / RSA / Digital signature / Digital Signature Algorithm / PKCS / Cryptography / Public-key cryptography / Cryptography standards

Public Comments Regarding FIPS 186-1, Digital Signature Standard (DSS) [in response to a notice in the December 15, 1998 Federal Register (Volume 63, Number 240; pages[removed]From: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-04-12 16:50:34
44Elliptic Curve DSA / Elliptic curve cryptography / NSA Suite B Cryptography / Digital signature / Digital Signature Algorithm / Key / Elliptic curve / Implicit certificate / CRYPTREC / Cryptography / Public-key cryptography / Key management

Suite B Implementer’s Guide to FIPS[removed]ECDSA) February 3, [removed]

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2010-03-11 10:51:46
45HMAC / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Cryptographic hash function / PKCS / Transport Layer Security / Digital Signature Algorithm / Network Security Services / Cryptography / Cryptography standards / FIPS 140

Microsoft Word - 1a - HealthStackIO FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-25 18:22:54
46Digital signature / Key / RSA / Symmetric-key algorithm / Cryptosystem / Key generation / Book:Cryptography / Cryptography / Public-key cryptography / Key management

Appendix A - Digital Signatures with Public Key Cryptography

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2014-12-01 16:41:53
47SHA-1 / Digital Signature Algorithm / Secure Hash Standard / Data Encryption Standard / Hash function / MD4 / SHA-2 / MD5 / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS[removed]Secure Hash Standard Page 1 of 21 Return to the FIPS Home Page

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-10-31 23:49:20
48Digital signature / Key / RSA / Symmetric-key algorithm / Cryptosystem / Key generation / Book:Cryptography / Cryptography / Public-key cryptography / Key management

Appendix A - Digital Signatures with Public Key Cryptography

Add to Reading List

Source URL: www.ots.treas.gov

Language: English - Date: 2014-11-23 08:49:36
49Error detection and correction / Message authentication codes / Search algorithms / HMAC / Hash function / Collision / Digital signature / Algorithm / SHA-2 / Cryptography / Hashing / Cryptographic hash functions

Comments on NIST Draft Requirements and Criteria for Hash Algorithm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:56:14
50FIPS 140-2 / FIPS 140 / Digital Signature Algorithm / Authentication / Cryptography / Cryptography standards / Public-key cryptography

0562A238 SGSS FIPS Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE