Journal articles on the topic 'Digital signature algorithms'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Digital signature algorithms.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Stallings, William. "Digital Signature Algorithms." Cryptologia 37, no. 4 (October 2013): 311–27. http://dx.doi.org/10.1080/01611194.2013.797044.
Full textKim, Tuan Nguyen, Duy Ho Ngoc, and Nikolay A. Moldovyan. "Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number." International Journal of Network Security & Its Applications 13, no. 04 (July 31, 2021): 59–69. http://dx.doi.org/10.5121/ijnsa.2021.13405.
Full textYesina, M. V., and B. S. Shahov. "Analysis and research of digital signature algorithm Picnic." Radiotekhnika, no. 203 (December 23, 2020): 19–24. http://dx.doi.org/10.30837/rt.2020.4.203.02.
Full textToradmalle, Dhanashree, Jayabhaskar Muthukuru, and B. Sathyanarayana. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (August 1, 2019): 3228. http://dx.doi.org/10.11591/ijece.v9i4.pp3228-3231.
Full textFan, Ai Wan, and Shu Xi Lu. "An Improved Elliptic Curve Digital Signature Algorithm." Applied Mechanics and Materials 34-35 (October 2010): 1024–27. http://dx.doi.org/10.4028/www.scientific.net/amm.34-35.1024.
Full textIsnaini, Herdita Fajar, and Karyati Karyati. "Penerapan skema tanda tangan Schnorr pada pembuatan tanda tangan digital." PYTHAGORAS: Jurnal Pendidikan Matematika 12, no. 1 (June 4, 2017): 57. http://dx.doi.org/10.21831/pg.v12i1.11631.
Full textNazal, Muhammad Asghar, Reza Pulungan, and Mardhani Riasetiawan. "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 13, no. 3 (July 31, 2019): 273. http://dx.doi.org/10.22146/ijccs.47267.
Full textEl-Rahman, Sahar A., Daniyah Aldawsari, Mona Aldosari, Omaimah Alrashed, and Ghadeer Alsubaie. "A Secure Cloud Based Digital Signature Application for IoT." International Journal of E-Services and Mobile Applications 10, no. 3 (July 2018): 42–60. http://dx.doi.org/10.4018/ijesma.2018070103.
Full textOlorunfemi, Temitope O. S., B. K. Alese ., S. O. Falaki ., and O. Fajuyigbe . "Implementation of Elliptic Curve Digital Signature Algorithms." Journal of Software Engineering 1, no. 1 (December 15, 2006): 1–12. http://dx.doi.org/10.3923/jse.2007.1.12.
Full textYen, S. M., and C. S. Laih. "Fast algorithms for LUC digital signature computation." IEE Proceedings - Computers and Digital Techniques 142, no. 2 (1995): 165. http://dx.doi.org/10.1049/ip-cdt:19951788.
Full textVračar, Ljubomir M., Milan D. Stojanović, Aleksandar S. Stanimirović, and Zoran D. Prijić. "Influence of Encryption Algorithms on Power Consumption in Energy Harvesting Systems." Journal of Sensors 2019 (April 8, 2019): 1–9. http://dx.doi.org/10.1155/2019/8520562.
Full textOlabode, Olatubosun, AdeniyiJide Kehinde, Akinyede Olufemi, Oluwadare A. Samuel, and Fasoranbaku A. Olusoga. "A SIGNATURE IDENTIFICATION SYSTEM WITH PRINCIPAL COMPONENT ANALYSIS AND STENTIFORD THINNING ALGORITHMS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 9 (June 23, 2015): 6074–84. http://dx.doi.org/10.24297/ijct.v14i9.7079.
Full textZentai, Daniel. "On the Efficiency of the Lamport Signature Scheme." Land Forces Academy Review 25, no. 3 (September 1, 2020): 275–80. http://dx.doi.org/10.2478/raft-2020-0033.
Full textGhosh, Sagarika, Marzia Zaman, Gary Sakauye, and Srinivas Sampalli. "An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme." Applied Sciences 11, no. 5 (February 26, 2021): 2082. http://dx.doi.org/10.3390/app11052082.
Full textMoldovyan, D. N., A. A. Moldovyan, and D. Yu Guryanov. "Alternative signature generation procedures in the digital signature schemes based on the hidden discrete logarithm problem." Informatization and communication, no. 2 (April 30, 2020): 100–107. http://dx.doi.org/10.34219/2078-8320-2020-11-2-100-107.
Full textFarooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (July 1, 2019): 2536. http://dx.doi.org/10.3390/en12132536.
Full textHaraty, Ramzi A., A. N. El-Kassar, and Bilal Shibaro. "A Comparative Study of RSA Based Digital Signature Algorithms." Journal of Mathematics and Statistics 2, no. 1 (January 1, 2006): 354–59. http://dx.doi.org/10.3844/jmssp.2006.354.359.
Full textHaraty, Ramzi A., A. N. El-Kassar, and Bilal M. Shebaro. "A comparative study of ElGamal based digital signature algorithms." Journal of Computational Methods in Sciences and Engineering 6, s1 (April 6, 2007): S147—S156. http://dx.doi.org/10.3233/jcm-2006-6s112.
Full textA, Sangita. "Analytical Study of Modified RSA Algorithms for Digital Signature." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 3 (2015): 944–49. http://dx.doi.org/10.17762/ijritcc2321-8169.150310.
Full textCastillo, E., D. P. Morales, A. García, L. Parrilla, E. Todorovich, and U. Meyer-Baese. "Design Time Optimization for Hardware Watermarking Protection of HDL Designs." Scientific World Journal 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/752969.
Full textJasem, Farah Maath, Ali Makki Sagheer, and Abdullah M. Awad. "Enhancement of digital signature algorithm in bitcoin wallet." Bulletin of Electrical Engineering and Informatics 10, no. 1 (February 1, 2021): 449–57. http://dx.doi.org/10.11591/eei.v10i1.2339.
Full textKochubinskya, A. I., and O. M. Fal’. "Blind digital signature calculation algorithms based on the Ukrainian national digital signature standard DSTU 4145-2002 and Russian digital signature standard GOST R 34.10-20011." Cybernetics and Systems Analysis 48, no. 4 (July 2012): 558–62. http://dx.doi.org/10.1007/s10559-012-9434-7.
Full textKuznetsov, Alexander, Anastasia Kiyan, Andrey Pushkarev, and Tatiana Kuznetsova. "A NEW APPROACH TO BUILDING A POST-QUANTUM SCHEME OF ELECTRONIC DIGITAL SIGNATURE." Information systems and technologies security, no. 1 (2) (2020): 23–30. http://dx.doi.org/10.17721/ists.2020.1.23-30.
Full textK, Leela, and Smitha Vinod. "Implementation of Digital Signature Using Hybrid Cryptosystem." International Journal of Engineering & Technology 7, no. 3.4 (June 25, 2018): 34. http://dx.doi.org/10.14419/ijet.v7i3.4.14671.
Full textLee, Dae-Hwi, Kangbin Yim, and Im-Yeong Lee. "A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments." Sensors 20, no. 14 (July 17, 2020): 3983. http://dx.doi.org/10.3390/s20143983.
Full textYOU, Lin, and Yong-xuan SANG. "Effective generalized equations of secure hyperelliptic curve digital signature algorithms." Journal of China Universities of Posts and Telecommunications 17, no. 2 (April 2010): 100–115. http://dx.doi.org/10.1016/s1005-8885(09)60454-4.
Full textZhou, Jie, Jian Bai, and Meng Shan Jiang. "White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode." Security and Communication Networks 2020 (November 19, 2020): 1–10. http://dx.doi.org/10.1155/2020/8881116.
Full textSusilawati Mohamad, Fatma, Fadi Mohammad Alsuhimat, Mohamad Afendee Mohamed, Mumtazimah Mohamad, and Azrul Amri Jamal. "Detection and Feature Extraction for Images Signatures." International Journal of Engineering & Technology 7, no. 3.28 (August 17, 2018): 44. http://dx.doi.org/10.14419/ijet.v7i3.28.20963.
Full textSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (March 6, 2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Full textЦиганенко, О. С. "Development of digital signature algorithm based on the Niederriter crypto-code system." Системи обробки інформації, no. 3(162), (September 30, 2020): 86–94. http://dx.doi.org/10.30748/soi.2020.162.09.
Full textKommey, Benjamin, Seth Kotey, Gideon Adom-Bamfi, and Eric Tutu Tchao. "Lossy codecs for digital image signatures." Sustainable Engineering and Innovation 3, no. 2 (July 28, 2021): 92–101. http://dx.doi.org/10.37868/sei.v3i2.id144.
Full textHendry Leo Kanickam, S., and L. Jayasimman. "Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data." Asian Journal of Computer Science and Technology 8, no. 1 (February 5, 2019): 53–61. http://dx.doi.org/10.51983/ajcst-2019.8.1.2118.
Full textIlyani Ahmad, Jasmin, Roshidi Din, and Mazida Ahmad. "Analysis Review on Public Key Cryptography Algorithms." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 447. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp447-454.
Full textMoldovyan, Nikolay, and Dmitry Moldovyan. "A post-quantum digital signature scheme on groups with four-dimensional cyclicity." Information and Control Systems, no. 2 (April 29, 2021): 43–51. http://dx.doi.org/10.31799/1684-8853-2021-2-43-51.
Full textMoldovyan, Dmitry, Alexandr Moldovyan, and Nikolay Moldovyan. "A novel method for development of post-quantum digital signature schemes." Information and Control Systems, no. 6 (December 15, 2020): 21–29. http://dx.doi.org/10.31799/1684-8853-2020-6-21-29.
Full textMark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (April 1, 2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Full textKuryazov, D. M. "Development of electronic digital signature algorithms with compound modules and their cryptanalysis." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 4 (April 20, 2021): 1085–99. http://dx.doi.org/10.1080/09720529.2021.1878628.
Full textLan, Haitao, Charat Thongprayoon, Adil Ahmed, Vitaly Herasevich, Priya Sampathkumar, Ognjen Gajic, and John C. O’Horo. "Automating Quality Metrics in the Era of Electronic Medical Records: Digital Signatures for Ventilator Bundle Compliance." BioMed Research International 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/396508.
Full textLozhnikov, P. S., and A. E. Sulavko. "Generation of a biometrically activated digital signature based on hybrid neural network algorithms." Journal of Physics: Conference Series 1050 (July 2018): 012047. http://dx.doi.org/10.1088/1742-6596/1050/1/012047.
Full textMoldovyan, Dmitry, Alexander Moldovyan, and Denis Guryanov. "Blind signature protocols based on hidden discrete logarithm problem." Information and Control Systems, no. 3 (June 15, 2020): 71–78. http://dx.doi.org/10.31799/1684-8853-2020-3-71-78.
Full textAl-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "REISCH: Incorporating Lightweight and Reliable Algorithms into Healthcare Applications of WSNs." Applied Sciences 10, no. 6 (March 15, 2020): 2007. http://dx.doi.org/10.3390/app10062007.
Full textAkinyele, Joseph A., Matthew Green, Susan Hohenberger, and Matthew Pagano. "Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes." Journal of Computer Security 22, no. 6 (December 16, 2014): 867–912. http://dx.doi.org/10.3233/jcs-140507.
Full textNurullaev, Mirkhon, and RAKHMATILLO DJURAEVICH ALOEV. "SOFTWARE, ALGORITHMS AND METHODS OF DATA ENCRYPTION BASED ON NATIONAL STANDARDS." IIUM Engineering Journal 21, no. 1 (January 20, 2020): 142–66. http://dx.doi.org/10.31436/iiumej.v21i1.1179.
Full textDi Matteo, Stefano, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci, and Sergio Saponara. "Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications." Energies 14, no. 15 (August 1, 2021): 4676. http://dx.doi.org/10.3390/en14154676.
Full textDorgham, O., Banan Al-Rahamneh, Ammar Almomani, Moh'd Al-Hadidi, and Khalaf F. Khatatneh. "Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud." International Journal of Cloud Applications and Computing 8, no. 1 (January 2018): 154–72. http://dx.doi.org/10.4018/ijcac.2018010108.
Full textGao, Wenhua, and Li Yang. "Quantum Election Protocol Based on Quantum Public Key Cryptosystem." Security and Communication Networks 2021 (April 13, 2021): 1–15. http://dx.doi.org/10.1155/2021/5551249.
Full textLovtsov, D. A., and L. V. Terenteva. "Legal Regulation of International Commercial Electronic Contracts. Technological and Legal Aspects of Electronic Signature." Lex Russica, no. 7 (July 23, 2020): 115–26. http://dx.doi.org/10.17803/1729-5920.2020.164.7.115-126.
Full textAlexandrova, Elena, Maria Poltavtseva, and Anastasia Yarmak. "Application of hierarchic authentication to isogenies of elliptic curves for providing safety of data routing in the systems of analysis of digital production traffic." SHS Web of Conferences 44 (2018): 00007. http://dx.doi.org/10.1051/shsconf/20184400007.
Full textDejamfar, Seyed Milad, and Sara Najafzadeh. "Enhance Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms." International Journal of Network Security & Its Applications 9, no. 4 (July 30, 2017): 45–55. http://dx.doi.org/10.5121/ijnsa.2017.9404.
Full textLee, Jaeheung, and Yongsu Park. "HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme." Applied Sciences 11, no. 16 (August 10, 2021): 7350. http://dx.doi.org/10.3390/app11167350.
Full text