Academic literature on the topic 'Digital signature algorithms'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital signature algorithms.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Digital signature algorithms"
Stallings, William. "Digital Signature Algorithms." Cryptologia 37, no. 4 (October 2013): 311–27. http://dx.doi.org/10.1080/01611194.2013.797044.
Full textKim, Tuan Nguyen, Duy Ho Ngoc, and Nikolay A. Moldovyan. "Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number." International Journal of Network Security & Its Applications 13, no. 04 (July 31, 2021): 59–69. http://dx.doi.org/10.5121/ijnsa.2021.13405.
Full textYesina, M. V., and B. S. Shahov. "Analysis and research of digital signature algorithm Picnic." Radiotekhnika, no. 203 (December 23, 2020): 19–24. http://dx.doi.org/10.30837/rt.2020.4.203.02.
Full textToradmalle, Dhanashree, Jayabhaskar Muthukuru, and B. Sathyanarayana. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (August 1, 2019): 3228. http://dx.doi.org/10.11591/ijece.v9i4.pp3228-3231.
Full textFan, Ai Wan, and Shu Xi Lu. "An Improved Elliptic Curve Digital Signature Algorithm." Applied Mechanics and Materials 34-35 (October 2010): 1024–27. http://dx.doi.org/10.4028/www.scientific.net/amm.34-35.1024.
Full textIsnaini, Herdita Fajar, and Karyati Karyati. "Penerapan skema tanda tangan Schnorr pada pembuatan tanda tangan digital." PYTHAGORAS: Jurnal Pendidikan Matematika 12, no. 1 (June 4, 2017): 57. http://dx.doi.org/10.21831/pg.v12i1.11631.
Full textNazal, Muhammad Asghar, Reza Pulungan, and Mardhani Riasetiawan. "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 13, no. 3 (July 31, 2019): 273. http://dx.doi.org/10.22146/ijccs.47267.
Full textEl-Rahman, Sahar A., Daniyah Aldawsari, Mona Aldosari, Omaimah Alrashed, and Ghadeer Alsubaie. "A Secure Cloud Based Digital Signature Application for IoT." International Journal of E-Services and Mobile Applications 10, no. 3 (July 2018): 42–60. http://dx.doi.org/10.4018/ijesma.2018070103.
Full textOlorunfemi, Temitope O. S., B. K. Alese ., S. O. Falaki ., and O. Fajuyigbe . "Implementation of Elliptic Curve Digital Signature Algorithms." Journal of Software Engineering 1, no. 1 (December 15, 2006): 1–12. http://dx.doi.org/10.3923/jse.2007.1.12.
Full textYen, S. M., and C. S. Laih. "Fast algorithms for LUC digital signature computation." IEE Proceedings - Computers and Digital Techniques 142, no. 2 (1995): 165. http://dx.doi.org/10.1049/ip-cdt:19951788.
Full textDissertations / Theses on the topic "Digital signature algorithms"
Sjöberg, Mikael. "Post-quantum algorithms for digital signing in Public Key Infrastructures." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210909.
Full textEtt nytt hot mot Public Key Infrastructures är den möjliga utvecklingen av storskaliga kvantdatorer som kan knäcka de asymmetriska kryptosystem som används idag. Ett flertal eventuellt kvantsäkra algoritmer har presenterats men de har än så länge inte sett mycket praktisk användning. Målet med detta examensarbete var att försöka identifiera eventuellt kvantsäkra signaturalgoritmer som skulle kunna lämpa sig för användning i Public Key Infrastructures idag. För att besvara forskningsfrågan gjordes en utredande litteraturstudie där relevanta signaturalgoritmer identifierades. Därefter prestandatestades de algoritmer som var implementerade i kryptografiska bibliotek. De algoritmer som prestandatestades var de hash-baserade algoritmerna XMSS och SPHINCS, flervariabel-baserade Rainbow och gitter-baserade BLISS-B. Resultaten visade att BLISS-B hade bäst prestanda och att prestandan var i nivå med RSA och ECDSA. Samtliga algoritmer hade emellertid relativt stora signatur- och/eller nyckelstorlekar. Eventuellt kvantsäkra algoritmer skulle redan idag kunna stödjas i Public Key Infrastructures eftersom många algoritmer finns implementerade i kryptografiska bibliotek. SPHINCS kunde rekommenderas när hög säkerhet krävs medan BLISS-B möjligtvis skulle kunna användas när lägre säkerhet kan tolereras i utbyte mot bättre prestanda. Största hindren för utbredd användning ansågs vara en brist på standardisering samt ineffektiva operationer jämfört med klassiska algoritmer och/eller tveksamma säkerhetsnivåer.
Martynenko, Mykola. "Investigation of cryptographic algorithms for the transfer of financial information." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9347.
Full textVychodil, Petr. "Softwarová podpora výuky kryptosystémů založených na problému faktorizace velkých čísel." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218146.
Full textPereira, Geovandro Carlos Crepaldi Firmino. "Multivariate and hash-based post-quantum digital signatures." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-08072016-145451/.
Full textOs esquemas convencionais de assinatura digital mais usados na atualidade têm sua segurança ameaçada com a possibilidade da construção de um computador quântico de grande porte. Ademias, tais esquemas não têm se mostrado completamente adequados para uso em plataformas com recursos computacionais extremamente escassos. Surge então a necessidade da busca por alternativas que satisfaçam as condições de segurança a médio e longo prazo, além de apresentarem desempenho razoável quando poucos recursos computacionais estão disponíveis. Este trabalho obtém assinaturas digitais pós-quânticas multivariadas quadráticas e baseadas em hash mais eficientes e tem o intuito de torna-las práticas em cenários como Internet das Coisas e Redes de Sensores Sem Fio (RSSF), caracterizados por apresentarem dispositivos com recursos computacionais limitados. No contexto de assinaturas multivariadas quadráticas, descreve-se uma nova técnica que tenta minimizar o principal gargalo desses esquemas, o grande tamanho de chaves. A nova técnica explora certos anéis matriciais com estrutura compacta. Mostra-se que alguns dos anéis analisados não são seguros (um dos ataques apresenta tempo polinomial), enquanto outros anéis menos compactos aparentam não sofrer ataque polinomial, mas infelizmente ainda não são adequados para uso em dispositivos muito restritos. Por outro lado, descreve-se um método para obter assinaturas digitais baseadas em hash que fornece redução das assinaturas para 2/3 do tamanho original do esquema multi-time Merkle-Winternitz. De fato, o tamanho das assinaturas constitui o principal gargalo desses esquemas, A melhoria também acarreta uma redução em 2/3 nos tempos de execução (geração de chave, geração de assinaturas e verificação de assinatura) e no consumo de energia para essas operações quando executadas em um microcontrolador AVR tipicamente usado em Redes de Sensores Sem Fio, o AT-mega 128L. Este resultado torna-se promissor para implantação de assinaturas baseadas em hash no cenário de Internet das Coisas.
Kouchaki, Barzi Behnaz. "Points of High Order on Elliptic Curves : ECDSA." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-58449.
Full textAl-Gindy, Ahmed M. N. "Design and analysis of Discrete Cosine Transform-based watermarking algorithms for digital images. Development and evaluation of blind Discrete Cosine Transform-based watermarking algorithms for copyright protection of digital images using handwritten signatures and mobile phone numbers." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5450.
Full textKirlar, Baris Bulent. "Isomorphism Classes Of Elliptic Curves Over Finite Fields Of Characteristic Two." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606489/index.pdf.
Full textMin, Menglei. "Evaluation and Implementation for Pushing Automatic Updates to IoT Devices." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31483.
Full textDebris-Alazard, Thomas. "Cryptographie fondée sur les codes : nouvelles approches pour constructions et preuves ; contribution en cryptanalyse." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS482.
Full textIn this thesis we study code-based cryptography. By this term we mean the crypto-systems whose security relies on the generic decoding problem. The first of those systems is a public key encryption scheme proposed by McEliece in 1978. Four decades later, no attack is known to present a serious threat on the system, even on a quantum computer. This makes code-based cryptography a credible candidate for post-quantum cryptography. First we give attacks against the code-based signature scheme RankSign, which was proposed to the post-quantum standardization of the NIST, and against the first code-based Identity-Based-Encryption scheme. On the other hand we propose a new code-based signature scheme: Wave. For this design we introduced a new trapdoor, the family of generalized (U,U+V)-codes. We show how to decode them for weights such that the generic decoding problem is hard. Then we show how to follow the Gentry-Peikert and Vaikuntanathan strategy which has proved to be fruitful in lattice-based cryptography. This was done by avoiding any information leakage of signatures thanks to an efficient rejection sampling. Furthermore, for the first time we propose a crypto-system whose security relies on the generic decoding problem for high distances. We give in this thesis the best known algorithm to solve this problem. At last, we study one of the few alternatives to information set decoding: the statistical decoding. First we improve algorithms to compute parity-check equations of small or moderate weight and we make the first asymptotic study of its complexity. We show that statistical decoding is not competitive with information set decoding contrary to what was claimed. This study relies on new results about Krawtchouk polynomials
Guzý, Ladislav. "Elektronický podpis a jeho využití v účetnictví." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-197614.
Full textBook chapters on the topic "Digital signature algorithms"
Schneier, Bruce. "Public-Key Digital Signature Algorithms." In Applied Cryptography, Second Edition, 483–502. Indianapolis, Indiana: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119183471.ch20.
Full textTian, Haibo, Peiran Luo, and Yinxue Su. "An Efficient Group Signature Based Digital Currency System." In Parallel Architectures, Algorithms and Programming, 380–92. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2767-8_34.
Full textMoldovyan, Alexandr Andreevich, Nikolay Andreevich Moldovyan, Ngoc Han Phieu, Cong Manh Tran, and Hieu Minh Nguyen. "Digital Signature Algorithms Based on Hidden Discrete Logarithm Problem." In Frontiers in Intelligent Computing: Theory and Applications, 1–12. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9920-6_1.
Full textMoldovyan, Nikolay, and Andrey Moldovyan. "Vector Finite Groups as Primitives for Fast Digital Signature Algorithms." In Lecture Notes in Geoinformation and Cartography, 317–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00304-2_22.
Full textSu, Shenghui, Yongquan Cai, and Changxiang Shen. "The Banknote Anti-forgery System Based on Digital Signature Algorithms." In Intelligence and Security Informatics, 44–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69304-8_5.
Full textMoldovyan, Nikolay A., Dmitriy N. Moldovyan, Alexander A. Moldovyan, Hieu Minh Nguyen, and Le Hoang Tuan Trinh. "Post-quantum Digital-Signature Algorithms on Finite 6-Dimensional Non-commutative Algebras." In Future Data and Security Engineering, 325–41. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63924-2_19.
Full textPrasad, Ajay. "Digital Signatures." In Emerging Security Algorithms and Techniques, edited by Keshav Kaushik, 249–72. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor &: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-15.
Full textNishida, Yuki, Hiromasa Saito, Ran Chen, Akira Kawata, Jun Furuse, Kohei Suenaga, and Atsushi Igarashi. "Helmholtz: A Verifier for Tezos Smart Contracts Based on Refinement Types." In Tools and Algorithms for the Construction and Analysis of Systems, 262–80. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72013-1_14.
Full textNoroozi, Erfaneh, Salwani Mohd Daud, Ali Sabouhi, and Hafiza Abas. "A New Dynamic Hash Algorithm in Digital Signature." In Communications in Computer and Information Science, 583–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35326-0_58.
Full textSun, Xiuyan. "An Improved Symmetric Key Encryption Algorithm for Digital Signature." In Lecture Notes in Electrical Engineering, 467–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14350-2_59.
Full textConference papers on the topic "Digital signature algorithms"
Haraty, Ramzi A., A. N. El-Kassar, and Bilal M. Shebaro. "A Comparative Study of Elgamal Based Digital Signature Algorithms." In 2006 World Automation Congress. IEEE, 2006. http://dx.doi.org/10.1109/wac.2006.375953.
Full textXuan, Zuguang, Zhenjun Du, and Rong Chen. "Comparison Research on Digital Signature Algorithms in Mobile Web Services." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5301198.
Full textRusnak, Patrik. "Algorithms for Calculation of Logical Derivatives for Survival Signature and their Analysis." In 2021 International Conference on Information and Digital Technologies (IDT). IEEE, 2021. http://dx.doi.org/10.1109/idt52577.2021.9497638.
Full textGong, Qianru, and Xingju Wang. "Security algorithms of digital signature-based to mainstream electronic trading site account." In 2013 International Conference on Information and Communication Technology for Education. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/icte130031.
Full textUmamageswari, A., and G. R. Suresh. "Novel algorithms for secure medical image communication using Digital Signature with various attacks." In 2013 Fifth International Conference on Advanced Computing (ICoAC). IEEE, 2013. http://dx.doi.org/10.1109/icoac.2013.6921943.
Full textAkinyele, Joseph A., Matthew Green, Susan Hohenberger, and Matthew W. Pagano. "Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes." In the 2012 ACM conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382248.
Full textNoel, Moses Dogonyaro, Onomza Victor Waziri, Muhammad Shafii Abdulhamid, Adebayo Joseph Ojeniyi, and Malvis Ugonna Okoro. "Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions." In 2020 2nd International Conference on Computer and Information Sciences (ICCIS). IEEE, 2020. http://dx.doi.org/10.1109/iccis49240.2020.9257656.
Full textScarselli, Rafael B., Leonardo Fiório Soares, and Igor Monteiro Moraes. "Uma avaliação de Algoritmos Criptográficos em Redes IEC 61850: Uma Abordagem Prática." In II Workshop de Segurança Cibernética em Dispositivos Conectados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wscdc.2019.7704.
Full textSetiawan, Hermawan, and Kesuma Rey Citra. "Design of Secure Electronic Disposition Applications by Applying Blowfish, SHA-512, and RSA Digital Signature Algorithms to Government Institution." In 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2018. http://dx.doi.org/10.1109/isriti.2018.8864280.
Full textReis, Paulo Ricardo, and Fábio Borges. "Digital Signatures in a Quantum World: Evaluating The Trade-off Between Performance and Security for GeMSS." In V Workshop de Regulação, Avaliação da Conformidade e Certificação de Segurança. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/wrac.2019.14034.
Full textReports on the topic "Digital signature algorithms"
Cooper, David A., Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, and Carl A. Miller. Recommendation for Stateful Hash-Based Signature Schemes. National Institute of Standards and Technology, October 2020. http://dx.doi.org/10.6028/nist.sp.800-208.
Full textBlake-Wilson, S., G. Karlinger, T. Kobayashi, and Y. Wang. Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures. RFC Editor, April 2005. http://dx.doi.org/10.17487/rfc4050.
Full textAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Full textPornin, T. Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA). RFC Editor, August 2013. http://dx.doi.org/10.17487/rfc6979.
Full textJosefsson, S., and I. Liusvaara. Edwards-Curve Digital Signature Algorithm (EdDSA). RFC Editor, January 2017. http://dx.doi.org/10.17487/rfc8032.
Full textHousley, R. Use of Edwards-Curve Digital Signature Algorithm (EdDSA) Signatures in the Cryptographic Message Syntax (CMS). RFC Editor, August 2018. http://dx.doi.org/10.17487/rfc8419.
Full textDegtyarev, A. GOST R 34.10-2012: Digital Signature Algorithm. Edited by V. Dolmatov. RFC Editor, December 2013. http://dx.doi.org/10.17487/rfc7091.
Full textDolmatov, V., ed. GOST R 34.10-2001: Digital Signature Algorithm. RFC Editor, March 2010. http://dx.doi.org/10.17487/rfc5832.
Full textHoffman, P., and W. C. A. Wijngaards. Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC. RFC Editor, April 2012. http://dx.doi.org/10.17487/rfc6605.
Full textFu, D., and J. Solinas. IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA). RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4754.
Full text